Zobrazeno 1 - 10
of 30
pro vyhledávání: '"SABSA"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 422-452 (2021)
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a
Externí odkaz:
https://doaj.org/article/0ef8b20917bb4def8606297c11802048
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2349 (2023)
Identity management ensures that users have appropriate access to resources, such as ICT services and data. Thereby, identity management does not only identify, authenticate, and authorize individuals, but also the hardware devices and software appli
Externí odkaz:
https://doaj.org/article/19671035b11c4218b98a4cd498749288
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 22, Pp 422-452 (2021)
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
International audience; An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Marijke Coetzee, Ferdinand Damon
Publikováno v:
Lecture Notes in Business Information Processing
12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS)
12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Sep 2018, Poznan, Poland. pp.123-133, ⟨10.1007/978-3-319-99040-8_10⟩
Lecture Notes in Business Information Processing ISBN: 9783319990392
CONFENIS
12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS)
12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Sep 2018, Poznan, Poland. pp.123-133, ⟨10.1007/978-3-319-99040-8_10⟩
Lecture Notes in Business Information Processing ISBN: 9783319990392
CONFENIS
Part 4: Data Access, Security and Privacy; International audience; Executives overseeing Identity and Access Management (IAM) solutions of enterprise information systems have to manage problematic issues at business, technology and governance levels
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a0de8597db5d94c9bfeee9c2da5158ac
https://hal.inria.fr/hal-01963057/document
https://hal.inria.fr/hal-01963057/document
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. SCADA and ICS security have been focusing on addressing issues such as vulnerability discovery and int
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06245df5ba7a04627e3cf6593dbb8620
https://doi.org/10.1504/ijcis.2017.10009242
https://doi.org/10.1504/ijcis.2017.10009242
Autor:
van Os, Rob
Information security architecture is a term that is applied to a wide variety of activities, each different in the level of detail and the organisational level at which it acts. This makes communication about information security architecture dfficul
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7490d2cc1415dadf2150d78574262b86
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-58172
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-58172
Information security nowadays have shifted from the more traditional computer and network security, to software security and malware analysis. Especially with the cloud computing era and IaaS, PaaS and Saas offerings readily available more and more t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9ba002be5b6a40eee99a46b9ae0a4eb5
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54559
http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-54559