Representing Security Policies in Web Information Systems (original) (raw)

Information Security Policies

Jatinder N.d Gupta

Handbook of Research on Information Security and Assurance

View PDFchevron_right

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

Security Patterns, Towards a Further Level

Antonio Muñoz

Proceedings of the International Conference on Security and Cryptography, 2009

View PDFchevron_right

Parameters and Guidelines of Enforceable Information Security Management Systems

Sándor Dombora

Interdisciplinary Description of Complex Systems, 2019

View PDFchevron_right

Principles and Practices of Network Security

Dr Ihtiram Raza Khan

Zenodo (CERN European Organization for Nuclear Research), 2023

View PDFchevron_right

Security Policy Framework and Algorithms for Web Server Content Protection

Paul Vickers

2007

View PDFchevron_right

Representation of Security and Dependability Solutions

Antonio Muñoz

Security and Dependability for Ambient Intelligence, 2009

View PDFchevron_right

An advanced policy based authorisation infrastructure

Kaniz Fatema

Proceedings of the 5th ACM workshop on Digital identity management, 2009

View PDFchevron_right

A Composite Framework for Behavioral Compliance with Information Security Policies

Raymond Panko

2012

View PDFchevron_right

Human factors, security and safety

Frank Kooi

2009

View PDFchevron_right

Abstracting application-level web security

ISMAIL mail

Proceedings of the eleventh international conference on World Wide Web - WWW '02, 2002

View PDFchevron_right

Secure Web Applications: A Systematic Approach

Habtamu Bogale

Sam, 2007

View PDFchevron_right

The Security Challenges Emerging from the Technological Developments

Ricardo Montenegro

Mobile Networks and Applications, 2019

View PDFchevron_right

Software Engineering Techniques Applied to AmI: Security Patterns

Antonio Muñoz

Developing Ambient Intelligence

View PDFchevron_right

Flexible service offering with semantic policies

flavio maria de paoli

2008

View PDFchevron_right

The Patterns for Information System Security

diego abbo

Proceedings of the 11th International Conference on Enterprise Information

View PDFchevron_right

Model-Driven Development of a Web Service-Oriented Architecture and Security Policies

Miguel A de Miguel

2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

View PDFchevron_right

A Model-Based Framework for Security Policy Specification, Deployment and Testing

Y. Le Traon

Model Driven Engineering Languages and Systems, 2008

View PDFchevron_right

Redefining security in the Middle East

Amanda Jacoby

2002

View PDFchevron_right

Closing the protection gap article IHRLR

Rashida Manjoo

View PDFchevron_right

Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations

Bashar Kabbani

2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014

View PDFchevron_right

Applied Aspects of Information Technology

Lubomyr (Любомир) Petryshyn (Петришин)

View PDFchevron_right

OSCE Mediterranean seminar on the human dimension of security

Joseph Filletti

1999

View PDFchevron_right

Global Preventive Security and its unbearable lightness

Didier Bigo

HAL (Le Centre pour la Communication Scientifique Directe), 2014

View PDFchevron_right

Confidentiality

Raanan Gillon

BMJ, 1985

View PDFchevron_right

How to Specify Security Services: A Practical Approach

José L. Vivas

Lecture Notes in Computer Science, 2003

View PDFchevron_right

The Policy Machine for Security Policy Management

David Ferraiolo

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Introduction to the issue

Imelda Katherine Brady

Journal of Public Affairs Education, 2018

View PDFchevron_right

Developing a Secure Web Application Using OWASP Guidelines

Mohd Nizam Osman

Computer and Information …, 2009

View PDFchevron_right

Information security policy compliance model in organizations

Nader Sohrabi Safa

Computers & Security, 2016

View PDFchevron_right

Documentation

Richard Kurdiovsky

Synthesis lectures on engineers, technology, and society, 2024

View PDFchevron_right

Data Quality for Security Challenges

Rakesh Verma

2019

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Developing a Security Typed Java Servlet

Doaa Hassan

2008 The Fourth International Conference on Information Assurance and Security, 2008

View PDFchevron_right

Two-component model of security inspection: application and findings

Colin Drury

2006

View PDFchevron_right