Sciweavers

3149 search results - page 162 / 630
» IT security risk management
Sort
View
188
Voted
CODASPY
2011
14 years 4 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
99
Voted
FOSAD
2000
Springer
15 years 4 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
112
Voted
CCS
2010
ACM
14 years 7 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
106
Voted
DMDW
2000
118views Management» more  DMDW 2000»
15 years 2 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
108
Voted
CHI
2009
ACM
16 years 1 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle