Sciweavers

3149 search results - page 69 / 630
» IT security risk management
Sort
View
67
Voted
CRITIS
2007
15 years 11 days ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
CRISIS
2009
14 years 12 months ago
A reference model for risk-aware business process management
The major contribution of this paper is the
Stefan Jakoubi, Simon Tjoa
IJNSEC
2007
130views more  IJNSEC 2007»
14 years 10 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding
66
Voted
ICDCS
2010
IEEE
15 years 2 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
FINANCECOM
2007
Springer
209views Finance» more  FINANCECOM 2007»
15 years 5 months ago
Information Risk in Financial Institutions: Field Study and Research Roadmap
Abstract. Large financial firms with thousands of employees face many challenges ensuring workers have access to the right information, yet controlling access to unneeded data. We ...
Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M...