Results 261 to 270 of about 243,136 (313)
Some of the next articles are maybe not open access.
International Journal of Information Systems in the Service Sector, 2018
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development.
Shruti Jaiswal, Daya Gupta
openaire +1 more source
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of Security Engineering where security concerns are embedded during requirement, design, and testing phases of software development.
Shruti Jaiswal, Daya Gupta
openaire +1 more source
Measuring Securities Litigation Risk
SSRN Electronic Journal, 2011Abstract Extant research commonly uses indicator variables for industry membership to proxy for securities litigation risk. We provide evidence on the construct validity of this measure by reporting on the predictive ability of alternative models of litigation risk. While the industry measure alone does a relatively poor job of predicting litigation,
Irene Kim, Douglas J. Skinner
openaire +1 more source
Systems Engineering, 2012
Abstract Security metrics have evolved side by side with the advent of security tools and techniques. They have been derived from the techniques rather than specified as system requirements. This paper surveys the evolution and state of the practice of security metrics from both a technical and historical perspective. It describes the
Jennifer Bayuk, Ali Mostashari
openaire +1 more source
Abstract Security metrics have evolved side by side with the advent of security tools and techniques. They have been derived from the techniques rather than specified as system requirements. This paper surveys the evolution and state of the practice of security metrics from both a technical and historical perspective. It describes the
Jennifer Bayuk, Ali Mostashari
openaire +1 more source
2014
Abstract Purpose The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.
Tilman Brück +2 more
openaire +1 more source
Abstract Purpose The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.
Tilman Brück +2 more
openaire +1 more source
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
In the recent years, more attention is given to firewalls as they are considered the corner stone in Cyber defense perimeters. The ability to measure the quality of protection of a firewall policy is a key step to assess the defense level for any network.
Saeed Al-Haj, Ehab Al-Shaer
openaire +1 more source
In the recent years, more attention is given to firewalls as they are considered the corner stone in Cyber defense perimeters. The ability to measure the quality of protection of a firewall policy is a key step to assess the defense level for any network.
Saeed Al-Haj, Ehab Al-Shaer
openaire +1 more source
Measuring Application Security
2018We report on a qualitative study of application security (AppSec) program management. We sought to establish the boundaries used to define program scope, the goals of AppSec practitioners, and the metrics and tools used to measure performance. We find that the overarching goal of AppSec groups is to ensure the security of software systems; this is a ...
Christopher Horn, Anita D‘Amico
openaire +1 more source
Measures of Food Insecurity/Security
Journal of Nutrition Education, 2001ABSTRACT Nutrition education has the potential to play an important role in ensuring food security and improving nutritional status. Therefore, food security is recommended for inclusion in nutrition education evaluation efforts. Considerable progress has been made in developing brief tools that can be used to measure food security at the household ...
D P, Keenan +3 more
openaire +2 more sources
Data Processing, 1982
Abstract Token based access control systems can operate automatically, and to suit varying control requirements.
openaire +1 more source
Abstract Token based access control systems can operate automatically, and to suit varying control requirements.
openaire +1 more source
2017
The risk assessment process requires management to select security measures designed to reduce risks to an acceptable level and protect ePHI, in accordance with the HIPAA Security Rule. No specific measures are prescribed by HHS or the OCR. Rather, it is up to the entity to define the measures that meet those objectives.
openaire +1 more source
The risk assessment process requires management to select security measures designed to reduce risks to an acceptable level and protect ePHI, in accordance with the HIPAA Security Rule. No specific measures are prescribed by HHS or the OCR. Rather, it is up to the entity to define the measures that meet those objectives.
openaire +1 more source
Microelectronic security measures
2013In this dissertation I propose the concept of tamper protection grids for microelectronic security devices made from organic electronic materials. As security devices have become ubiquitous in recent years, they are becoming targets for criminal activity.
openaire +1 more source

