default search action
Integrity and Internal Control in Information Systems 2004: Fairfax, Virginia; USA
- Paul Dowland, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang:
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]. IFIP 193, Springer 2006, ISBN 978-0-387-29826-9 - Jean-Noël Ezingeard, David William Birchall:
Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002. 1-20 - Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin:
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper). 21-39 - Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy:
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper). 41-55 - Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos:
How Much Should We Pay for Security? (Invited Paper). 59-69 - Corey Hirsch:
Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems. 71-82 - Omar Zakaria:
Employee Security Perception in Cultivating Information Security Culture. 83-92 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
A Policy Framework for Access Management in Federated Information Sharing. 95-120 - Chao Yao, William H. Winsborough, Sushil Jajodia:
A Hierarchical Release Control Policy Framework. 121-137 - James R. Conrad, Paul W. Oman, Carol Taylor:
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC. 141-156 - Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study. 157-173 - Malcolm Robert Pattinson, Grantley Anderson:
Risk Communication, Risk Perception and Information Security. 175-184 - Janine L. Spears:
A Holistic Risk Analysis Method for Identifying Information Security Risks. 185-202 - Shaun Posthumus, Rossouw von Solms:
A Responsibility Framework for Information Security. 205-221 - Rahul Rastogi, Rossouw von Solms:
Information Security Governance - A Re-Definition. 223-236 - Louise Yngström:
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper). 237-245 - Reijo Savola, Juhani Anttila, Anni Sademies, Jorma Kajava, Jarkko Holappa:
Measurement of Information Security in Processes and Products. 249-265 - Vassilis Dimopoulos, Steven Furnell:
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises. 267-283 - Andrzej Bialas:
A UML Approach in the ISMS Implementation. 285-297 - Peng Liu:
Attack Aware Integrity Control in Databases (Invited Abstract). 301 - Oleksiy Mazhelis, Seppo Puuronen:
Characteristics and Measures for Mobile-Masquerader Detection. 303-318 - Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner:
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions. 319-333 - Yanjun Zuo, Brajendra Panda:
A Trust-Based Model for Information Integrity in Open Systems. 337-354 - Arnon Rosenthal:
Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda. 355-370 - Paul Thompson:
Semantic Information Infrastructure Protection (Invited Abstract). 371
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.