-
2
-
-
1642394689
-
-
Microsoft IBM, VeriSign, 1.0 edition
-
Atkinson, B., et al. "Web Services Security," Microsoft, IBM, VeriSign, 1.0 edition (2002)
-
(2002)
Web Services Security
-
-
Atkinson, B.1
-
4
-
-
84887406309
-
Outsourcing for competitive advantage
-
Bowles, J., Outsourcing for competitive advantage, available via http://www.vmc.com/articles/Forbes%20Advertorial.pdf (2004).
-
(2004)
-
-
Bowles, J.1
-
5
-
-
70350642949
-
Trusted virtual domains: Secure foundations for business and IT services
-
Bussani, A., et al. Trusted Virtual Domains: Secure Foundations for Business and IT Services, Technical Report RC23792, IBM (2005).
-
(2005)
Technical Report RC23792, IBM
-
-
Bussani, A.1
-
8
-
-
84883407120
-
-
CISWG, Technical Report CS1/05-0005, Government reform comittee
-
CISWG, Report of the best practices and metrics teams, Technical Report CS1/05-0005, Government reform comittee (2004).
-
(2004)
Report of the Best Practices and Metrics Teams
-
-
-
9
-
-
34250759867
-
Managing network security - Part 5: Risk management or risk analysis
-
Cohen, F., Managing network security - part 5: Risk management or risk analysis, Network Sec. 1997 (1997), pp. 15-19.
-
(1997)
Network Sec. 1997
, pp. 15-19
-
-
Cohen, F.1
-
10
-
-
33646784057
-
Information Security Management - A New Paradigm
-
Eloff, J. and M. Eloff, Information Security Management - A New Paradigm, in: Proc. of SAICSIT, 2003, pp. 130 - 136.
-
(2003)
Proc. of SAICSIT
, pp. 130-136
-
-
Eloff, J.1
Eloff, M.2
-
11
-
-
34250779459
-
The ins and outs of it outsourcing
-
Goth, G., The ins and outs of it outsourcing, IT Professional 1 (1999), pp. 11 - 14.
-
(1999)
IT Professional
, vol.1
, pp. 11-14
-
-
Goth, G.1
-
12
-
-
46749096706
-
Trusted virtual domains: Toward secure distributed services
-
Yokohama, Japan
-
Griffin, J. L., et al. Trusted virtual domains: Toward secure distributed services, in: Proc. of HotDep, Yokohama, Japan, 2005.
-
(2005)
Proc. of HotDep
-
-
Griffin, J.L.1
-
13
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
Henning, R., Security service level agreements: quantifiable security for the enterprise?, in: Proc. of NSPW (2000), pp. 54-60.
-
(2000)
Proc. of NSPW
, pp. 54-60
-
-
Henning, R.1
-
16
-
-
55549137582
-
Assessment of enterprise information security - An architecture theory diagram definition
-
Johansson, E. and P. Johnson, Assessment of enterprise information security - an architecture theory diagram definition, in: Proc. of CSER, 2005.
-
(2005)
Proc. of CSER
-
-
Johansson, E.1
Johnson, P.2
-
17
-
-
37249047727
-
Service-oriented assurance comprehensive security by explicit assurances
-
Karjoth, G., et al Service-oriented assurance comprehensive security by explicit assurances, in: Proc. of QoP. (2005).
-
(2005)
Proc. of QoP
-
-
Karjoth, G.1
-
18
-
-
1242331287
-
TBSE - An engineering approach to the design of accurate and reliable security systems
-
Leach, J., TBSE - an engineering approach to the design of accurate and reliable security systems, Comp. & Sec. 23 (2004), pp. 22-28.
-
(2004)
Comp. & Sec.
, vol.23
, pp. 22-28
-
-
Leach, J.1
-
19
-
-
84887409446
-
The common criteria - Good, bad or indifferent?, Inform
-
List, W., The common criteria - good, bad or indifferent?, Inform. Sec. Technical Report 2 (1997), pp. 19-23.
-
(1997)
Sec. Technical Report 2
, pp. 19-23
-
-
List, W.1
-
21
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
Madan, B. B., et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems, Performance evaluation journal 1-4 (2004), pp. 167-186.
-
(2004)
Performance Evaluation Journal
, vol.1-4
, pp. 167-186
-
-
Madan, B.B.1
-
22
-
-
36049032185
-
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
-
to appear
-
Massacci, F., J. Mylopoulos and N. Zannone, Hierarchical hippocratic databases with minimal disclosure for virtual organizations, The VLDB J. (2006), to appear.
-
(2006)
The VLDB J
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
23
-
-
0037392527
-
Standards for xml and web services security
-
Naedele, M., Standards for xml and web services security, IEEE Comp. 36 (2003), pp. 96-98.
-
(2003)
IEEE Comp.
, vol.36
, pp. 96-98
-
-
Naedele, M.1
-
24
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., Y. Deswarte and M. Kaaniche, Experimenting with quantitative evaluation tools for monitoring operational security, TSE 25 (1999), pp. 633-650.
-
(1999)
TSE
, vol.25
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
30
-
-
30944468129
-
Evaluation methodology for the security of e-finance systems
-
Wang, Y. and P. K. Ray, Evaluation methodology for the security of e-finance systems, in: Proc. of EEE (2005).
-
(2005)
Proc. of EEE
-
-
Wang, Y.1
Ray, P.K.2
|