Sciweavers

14824 search results - page 93 / 2965
» Security - Introduction
Sort
View
97
Voted
ECIS
2000
15 years 2 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 20 days ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
100
Voted
SAFECOMP
2010
Springer
14 years 11 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
111
Voted
SECRYPT
2010
147views Business» more  SECRYPT 2010»
14 years 10 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
62
Voted
FOSAD
2007
Springer
15 years 6 months ago
Trust and Reputation Systems
Audun Jøsang