Results 11 to 20 of about 2,693,777 (322)
Methodology and software development for auditing information security management systems
Objectives. Classification of information systems (IS) security indicators and the creation of the method of improved software tool based on its results (in comparison with similar software tool developed earlier by the authors) for auditing information ...
V. A. Boiprav, L. L. Utin
doaj +1 more source
Security information management systems [PDF]
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire +1 more source
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds [PDF]
ObjectivesThe information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on ...
Woo-Sung Park +8 more
doaj +1 more source
Information Security Management System
K. Willett, Sigurjon Thor Arnason
openaire +2 more sources
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
The Security of Student Information Management System Based upon Blockchain
In recent years, with the development of science and technology, as an emerging data security technology, blockchain has been widely used in all walks of life by virtue of its immutability, uniqueness, smart contract, and decentralized organization ...
Mingfeng Yang, Jianying Wang
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
One of the keys to the successful implementation of information security management in an organization is the selection and implementation of an information security management system control that is good and in accordance with the needs of the ...
A P Aldya, S. Sutikno, Y. Rosmansyah
semanticscholar +1 more source
As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities.
Youngin You +3 more
semanticscholar +1 more source
Information security management system: Electronic apostille system security to ensure legal certainty across national borders [PDF]
Public document legalization services in Indonesia are currently not carried out electronically, with the exception of electronic application registration (e-form) and electronic validation of apostille certificates (e-register).
Dimas Sulistio Solekan +2 more
doaj +1 more source

