ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the first ACM workshop on Information security governance - WISG '09
Latest Publications
TOTAL DOCUMENTS
8
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By ACM Press
9781605587875
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Model driven security accreditation (MDSA)for agile, interconnected it landscapes
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655173
◽
2009
◽
Cited By ~ 5
Author(s):
Ulrich Lang
◽
Rudolf Schreiner
Keyword(s):
Model Driven
Download Full-text
Security risk management using internal controls
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655179
◽
2009
◽
Cited By ~ 9
Author(s):
Simon N. Foley
Keyword(s):
Risk Management
◽
Internal Controls
◽
Security Risk
◽
Security Risk Management
Download Full-text
An XACML-based privacy-centered access control system
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655178
◽
2009
◽
Cited By ~ 21
Author(s):
Claudio Agostino Ardagna
◽
Sabrina De Capitani di Vimercati
◽
Stefano Paraboschi
◽
Eros Pedrini
◽
Pierangela Samarati
Keyword(s):
Control System
◽
Access Control
◽
Access Control System
Download Full-text
GoCoMM
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655175
◽
2009
◽
Cited By ~ 8
Author(s):
Gabriela Gheorghe
◽
Fabio Massacci
◽
Stephan Neuhaus
◽
Alexander Pretschner
Download Full-text
Dynamic security policy learning
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655177
◽
2009
◽
Cited By ~ 5
Author(s):
Yow Tzu Lim
◽
Pau-Chen Cheng
◽
Pankaj Rohatgi
◽
John A. Clark
Keyword(s):
Security Policy
◽
Policy Learning
◽
Dynamic Security
Download Full-text
A method of calculating the cost of reducing the risk exposure of non-compliant process instances
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655172
◽
2009
◽
Cited By ~ 2
Author(s):
Yurdaer N. Doganata
◽
Francisco Curbera
Keyword(s):
Risk Exposure
◽
The Cost
Download Full-text
Strengthening employee's responsibility to enhance governance of IT
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655174
◽
2009
◽
Cited By ~ 17
Author(s):
Christophe Feltus
◽
Michaël Petit
◽
Eric Dubois
Download Full-text
Information security governance framework
Proceedings of the first ACM workshop on Information security governance - WISG '09
◽
10.1145/1655168.1655170
◽
2009
◽
Cited By ~ 14
Author(s):
Eijiroh Ohki
◽
Yonosuke Harada
◽
Shuji Kawaguchi
◽
Tetsuo Shiozaki
◽
Tetsuyuki Kagaya
Keyword(s):
Information Security
◽
Governance Framework
◽
Security Governance
◽
Information Security Governance
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close