Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Matunda Nyanchama"'
Autor:
Matunda Nyanchama
Publikováno v:
Information Systems Security. 14:29-56
Companies continue to pay heavily for confronting hacker attacks and responding to rapidly spreading viruses, worms, and Trojans. The impact on an organization can be substantial, ranging from loss of productivity to reputation. Hackers exploit known
Autor:
Marc Stefaniu, Matunda Nyanchama
Publikováno v:
Information Systems Security. 12:44-49
Imagine you are an information security manager and your boss is asking: “How secure are our information systems? Is the security getting better or worse? How do you know that?” One thing is sure: if you do not have a good answer, your own job ma
Autor:
Matunda Nyanchama, Paul Sop
Publikováno v:
Information Systems Security. 9:1-8
Information Security is a key component in modern enterprise planning and management given the integral role of information technology (IT) in today's enterprise. This entrenchment of security is also driven by the increasing growth of electronic tra
Autor:
Sylvia L. Osborn, Matunda Nyanchama
Publikováno v:
ACM Transactions on Information and System Security. 2:3-33
We describe in more detail than before the reference model for role-based access control introduced by Nyanchama and Osborn, and the role-graph model with its accompanying algorithms, which is one way of implementing role-role relationships. An alter
Autor:
Matunda Nyanchama, Sylvia L. Osborn
Publikováno v:
ACM SIGMOD Record. 22:45-51
In this paper we combined concepts of role-based protection and object oriented (O-O) databases to specify and enforce separation of duty as required for commercial database integrity [5, 23, 24]. Roles essentially partition database information into
Autor:
Sylvia L. Osborn, Matunda Nyanchama
Publikováno v:
ACM SIGSAC Review. 11:11-17
User role-based protection presents a flexible (hence adaptive) means for enforcing differing ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principl
Autor:
Debra Herrmann, Ben Rothke, Robert Slade, Ralph Spencer Poore, Jeff Davis, Todd Fitzgerald, Stephen Fried, Jeff Misrahi, Brian Geffert, Carl Endorf, Jeffrey Davis, Ken Shaurette, Kevin Henry, Ken Buszta, Louis Fried, William Stallings, Mollie Krehnke, David Krehnke, Jim Appleyard, Will Ozier, Sean Price, George McBride, Carl Jackson, Mark Carey, Ray Kaplan, Daniel Houser, Brett Regan Young, Duane Sharp, Matunda Nyanchama, Anna Wilson, Ralph Kliem, Sudhanshu Kairab, Brian Schultz, Carol Siegel, Ty Sagalow, Paul Serritella, John Wylder, Patrick Howard, Felicia Nicastro, Rebecca Herold, Robert Martin, Steven Christey, David Baker, Carl Burney, Jeffrey Fenton, James Wolfe, William Hugh Murray, Ed Skoudis, Edward Freeman, Brian Shorten, Chris Hare, Jon David, Sam Chun, Timothy Stacey, Tom Peltier, William Tompkins, Susan Hansche, Stan Stahl, Charles Hudson, Thomas Bray, Sanford Sherizen, William Boni, Laurie Hill McQuillan, Michael Corby, James Tiller
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77153672f6a1e28bb97406a198d1cabd
https://doi.org/10.1201/noe0849385858.ch3
https://doi.org/10.1201/noe0849385858.ch3
Autor:
Matunda Nyanchama, Anna Wilson
Publikováno v:
Information Security Management Handbook, Four Volume Set
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72aa8595677bda85323e8438bfcff2eb
https://doi.org/10.1201/9780203325438.ch030405
https://doi.org/10.1201/9780203325438.ch030405
Autor:
Anna Wilson, Matunda Nyanchama
Publikováno v:
Information Security Management Handbook, Four Volume Set
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cca9bed7eea5f1add7dc689210f1886c
https://doi.org/10.1201/9780203325438.ch80
https://doi.org/10.1201/9780203325438.ch80