-
1
-
-
34748828410
-
-
Privacy Rights Clearinghouse, A Chronology of Data Breaches, http://www.privacyrights.org/ar/ChronDataBreaches.htm
-
Privacy Rights Clearinghouse, "A Chronology of Data Breaches", http://www.privacyrights.org/ar/ChronDataBreaches.htm
-
-
-
-
2
-
-
34748874482
-
-
Privacy Rights Clearinghouse, How Many Identity Theft Victims Are There? What is the Impact? Summary of Survey Findings, http://www.privacyrights.org/ar/idtheftsurveys.htm
-
Privacy Rights Clearinghouse, "How Many Identity Theft Victims Are There? What is the Impact? Summary of Survey Findings", http://www.privacyrights.org/ar/idtheftsurveys.htm
-
-
-
-
4
-
-
84876010344
-
Why Privacy is Important
-
Summer
-
J. Rachels, "Why Privacy is Important", Philosophy and Public Affairs, Vol. 4, No. 4 (Summer 1975), pp. 323-333.
-
(1975)
Philosophy and Public Affairs
, vol.4
, Issue.4
, pp. 323-333
-
-
Rachels, J.1
-
5
-
-
34748830754
-
Challenges and Trends in Information Management
-
Datenbank-Spektrum
-
K. Kailing, A. Löser and V.Markl, "Challenges and Trends in Information Management", Datenbank-Spektrum, Volume 6, Number 19, 2006, pp. 15-22.
-
(2006)
, vol.6
, Issue.19
, pp. 15-22
-
-
Kailing, K.1
Löser, A.2
Markl, V.3
-
6
-
-
0242674432
-
Hippocratic Databases
-
Hong Kong, China, August
-
R. Agrawal, J. Kiernan, R. Srikant and Y. Xu. "Hippocratic Databases". Proc. of the 28th Int'l Conf. on Very Large Databases (VLDB 2002), Hong Kong, China, August 2002.
-
(2002)
Proc. of the 28th Int'l Conf. on Very Large Databases (VLDB
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
34748838821
-
-
Securities and Exchange Commission
-
Securities and Exchange Commission, "Sarbanes Oxley SEC Rules", http://www.sarbanes-oxley.com/section.php?level=1&pub_id=SEC-Rules.
-
Sarbanes Oxley SEC Rules
-
-
-
10
-
-
77953855120
-
-
International Organization for Standardization
-
International Organization for Standardization, "The ISO 17799 Directory", http://www.iso-17799.com/
-
The ISO 17799 Directory
-
-
-
11
-
-
4243109556
-
A model for evaluating IT security investments
-
H. Cavusoglu, B. Mishra and S. Raghunathan, "A model for evaluating IT security investments", Communications of the ACM, Vol 47, Issue 7, 2004, Pages 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
0038703577
-
Risk Analysis and the Security Survey
-
Boston, Butterworth
-
J. F. Broder, "Risk Analysis and the Security Survey", Publisher: Boston : Butterworth, 2000.
-
(2000)
Publisher
-
-
Broder, J.F.1
-
15
-
-
35148891603
-
Policy-Based Management and Sharing of Sensitive Information among Government Agencies
-
Washington DC, USA, October
-
T. Ager, C. Johnson and J. Kiernan, "Policy-Based Management and Sharing of Sensitive Information among Government Agencies", Proceedings of the 25th IEEE Military Communications Conference, Washington DC, USA, October 2006.
-
(2006)
Proceedings of the 25th IEEE Military Communications Conference
-
-
Ager, T.1
Johnson, C.2
Kiernan, J.3
-
16
-
-
85102591607
-
Limiting Disclosure in Hippocratic Databases
-
Toronto, Canada, August
-
K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu and D. DeWitt. "Limiting Disclosure in Hippocratic Databases". Proc. of the 30th Int'l Conf. on Very Large Databases (VLDB 2004), Toronto, Canada, August 2004.
-
(2004)
Proc. of the 30th Int'l Conf. on Very Large Databases (VLDB
-
-
Lefevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
17
-
-
0028513932
-
Access Control: Principles and Practice
-
R. Sandhu and P. Samarati, "Access Control: Principles and Practice", IEEE Communications Magazine, vol. 32(9), pp. 40-48. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
18
-
-
34748826595
-
Renewed Understanding of Access Control Policies
-
Baltimore, Maryland, U.S.A, pp, September
-
th National Computer Security Conference, Baltimore, Maryland, U.S.A., pp. 87-96, 20-23 September 1993.
-
(1993)
th National Computer Security Conference
-
-
Abrams, M.D.1
-
19
-
-
34748862801
-
Enterprise Security Governance - A practical guide to implement and Control ISG (Information Security Governance)
-
Vancouver, Canada. April 7
-
L. daCosta, G. Alves and A. Almeida, "Enterprise Security Governance - A practical guide to implement and Control ISG (Information Security Governance)", Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management, Vancouver, Canada. April 7, 2006.
-
(2006)
Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management
-
-
daCosta, L.1
Alves, G.2
Almeida, A.3
-
20
-
-
33847155027
-
Business Aware Policy Based Management
-
Vancouver, Canada. April 7
-
I. Aib, M. Salle, C. Bartolini, A. Boulmakoul, R. Boutaba and G. Pujolle, "Business Aware Policy Based Management, Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management, Vancouver, Canada. April 7, 2006.
-
(2006)
Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management
-
-
Aib, I.1
Salle, M.2
Bartolini, C.3
Boulmakoul, A.4
Boutaba, R.5
Pujolle, G.6
-
21
-
-
33847152561
-
Enforcing Business Rules and Information Security Policies through Compliance Audits
-
Vancouver, Canada. April 7
-
F. Yip, P. Ray and N. Paramesh, "Enforcing Business Rules and Information Security Policies through Compliance Audits", Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management, Vancouver, Canada. April 7, 2006.
-
(2006)
Proceedings of the 1st IEEE/IFIP International Workshop on Business-Driven IT Management
-
-
Yip, F.1
Ray, P.2
Paramesh, N.3
|