Sciweavers

136 search results - page 8 / 28
» Securing interdependent assets
Sort
View
95
Voted
SGAI
2007
Springer
15 years 6 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
81
Voted
ACSAC
2000
IEEE
15 years 4 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie
107
Voted
DBSEC
2006
125views Database» more  DBSEC 2006»
15 years 1 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
169
Voted
ASIASIM
2004
Springer
15 years 5 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 14 days ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck