Results 251 to 260 of about 2,449,057 (299)
Some of the next articles are maybe not open access.
Computers & Security, 1990
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
Computers & Security, 2002
This article reviews the recent spate of public policy initiatives which will impact on an organization's approach towards the security of its data.
openaire +1 more source
This article reviews the recent spate of public policy initiatives which will impact on an organization's approach towards the security of its data.
openaire +1 more source
On the buzzword 'security policy'
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 2002It is pointed out that, although the term 'security policy' is fundamental to computer security, its conflicting meanings have obscured important conceptual distinctions, especially where concerns other than confidentiality are involved. A clearer definition is needed to clarify routine technical discourse, facilitate resolution of key research issues,
openaire +1 more source
Interactive simulation of security policies
Proceedings of the 2002 ACM symposium on Applied computing, 2002A general framework for simulating security policies interactively is developed by ASMs (Gurevich's Abstract State Machines) and then mechanised by the ASM Workbench. The ASM external functions make it possible to simulate under the environmental influence the behaviour of a policy.
openaire +2 more sources
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013
Securely deleting data from storage systems has become difficult today. Most storage space is provided as a virtual resource and traverses many layers between the user and the actual physical storage medium. Operations to properly erase data and wipe out all its traces are typically not foreseen, particularly not in networked and cloud-storage systems.
Christian Cachin +3 more
openaire +2 more sources
Securely deleting data from storage systems has become difficult today. Most storage space is provided as a virtual resource and traverses many layers between the user and the actual physical storage medium. Operations to properly erase data and wipe out all its traces are typically not foreseen, particularly not in networked and cloud-storage systems.
Christian Cachin +3 more
openaire +2 more sources
1991
The major components of a balanced security programme are: existence of a comprehensive security policy; development and implementation of detailed security procedures; a method of monitoring compliance with, and the results of, such procedures.
openaire +1 more source
The major components of a balanced security programme are: existence of a comprehensive security policy; development and implementation of detailed security procedures; a method of monitoring compliance with, and the results of, such procedures.
openaire +1 more source
2013
Asking users to upload important documents and information content to SharePoint without providing a level of security to protect their data is like driving without a seatbelt. Users like to know that their data is secure when they are asked to move it from their work machines to shared servers and collaborative platforms, like SharePoint.
openaire +1 more source
Asking users to upload important documents and information content to SharePoint without providing a level of security to protect their data is like driving without a seatbelt. Users like to know that their data is secure when they are asked to move it from their work machines to shared servers and collaborative platforms, like SharePoint.
openaire +1 more source

