Results 11 to 20 of about 2,693,777 (322)

Methodology and software development for auditing information security management systems

open access: yesInformatika, 2022
Objectives. Classification of information systems (IS) security indicators and the creation of the method of improved software tool based on its results (in comparison with similar software tool developed earlier by the authors) for auditing information ...
V. A. Boiprav, L. L. Utin
doaj   +1 more source

Security information management systems [PDF]

open access: yesManagement Sciences, 2020
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire   +1 more source

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds [PDF]

open access: yesHealthcare Informatics Research, 2010
ObjectivesThe information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on ...
Woo-Sung Park   +8 more
doaj   +1 more source

Shinren : Non-monotonic trust management for distributed systems [PDF]

open access: yes, 2010
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core   +4 more sources

The Security of Student Information Management System Based upon Blockchain

open access: yesJournal of Electrical and Computer Engineering, 2022
In recent years, with the development of science and technology, as an emerging data security technology, blockchain has been widely used in all walks of life by virtue of its immutability, uniqueness, smart contract, and decentralized organization ...
Mingfeng Yang, Jianying Wang
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Measuring effectiveness of control of information security management system based on SNI ISO/IEC 27004: 2013 standard

open access: yesIOP Conference Series: Materials Science and Engineering, 2019
One of the keys to the successful implementation of information security management in an organization is the selection and implementation of an information security management system control that is good and in accordance with the needs of the ...
A P Aldya, S. Sutikno, Y. Rosmansyah
semanticscholar   +1 more source

Advanced approach to information security management system utilizing maturity models in critical infrastructure

open access: yesKSII Transactions on Internet and Information Systems, 2018
As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities.
Youngin You   +3 more
semanticscholar   +1 more source

Information security management system: Electronic apostille system security to ensure legal certainty across national borders [PDF]

open access: yesInternational Journal of Data and Network Science
Public document legalization services in Indonesia are currently not carried out electronically, with the exception of electronic application registration (e-form) and electronic validation of apostille certificates (e-register).
Dimas Sulistio Solekan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy