Sciweavers

14824 search results - page 93 / 2965
» Security - Introduction
Sort
View
ECIS
2000
15 years 3 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 2 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
SAFECOMP
2010
Springer
15 years 25 days ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
SECRYPT
2010
147views Business» more  SECRYPT 2010»
15 years 9 days ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
FOSAD
2007
Springer
15 years 8 months ago
Trust and Reputation Systems
Audun Jøsang