Sciweavers

119 search results - page 5 / 24
» Organisational Information Security: A Viable System Perspec...
Sort
View
89
Voted
ICDS
2009
IEEE
15 years 4 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
SACMAT
2009
ACM
15 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
96
Voted
AISM
2004
14 years 10 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
IJIEM
2010
126views more  IJIEM 2010»
14 years 6 months ago
E-Health readiness framework from Electronic Health Records perspective
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...
160
Voted
CODASPY
2011
14 years 29 days ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu