A Generic Framework for Information Security Policy Development (original) (raw)

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

Information security policy compliance model in organizations

Nader Sohrabi Safa

Computers & Security, 2016

View PDFchevron_right

The Policy Machine for Security Policy Management

David Ferraiolo

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Policy Note

Daniel Friesner

Journal of Economic Issues, 2014

View PDFchevron_right

Information Security Policies

Jatinder N.d Gupta

Handbook of Research on Information Security and Assurance

View PDFchevron_right

Policy Advice

Klaus Zimmermann

2014

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar

Journal in Computer Virology, 2007

View PDFchevron_right

Recommendations for Policy Makers

Andrew Kakabadse

The Independent Director in Society, 2020

View PDFchevron_right

IT Security Governance Legal Issues

Gemma Minero Alejandre

Theory and Research

View PDFchevron_right

Guide to developing a National Cyber Security Strategy

Mohammed I Alghamdi

Materials Today: Proceedings, 2021

View PDFchevron_right

A Model-Based Framework for Security Policy Specification, Deployment and Testing

Y. Le Traon

Model Driven Engineering Languages and Systems, 2008

View PDFchevron_right

Building an information security education program

Merrill Warkentin

Proceedings of the 1st annual conference on Information security curriculum development - InfoSecCD '04, 2004

View PDFchevron_right

How to Specify Security Services: A Practical Approach

José L. Vivas

Lecture Notes in Computer Science, 2003

View PDFchevron_right

An Introduction to the Policy Process

Sl domerique

View PDFchevron_right

Information Security Awareness: An Innovation Approach

Carlos Orozco Corona

Egham, England: Department of Mathematics, Royal …, 2009

View PDFchevron_right

Computer and Network Security [Working Title]

Jaydip Sen

2019

View PDFchevron_right

Usable Security: A Systematic Literature Review

Giorgia Tempestini

Information, 2023

View PDFchevron_right

Network Security: Vulnerabilities and Disclosure Policy*

Chaim Fershtman

The Journal of Industrial Economics, 2010

View PDFchevron_right

The Patterns for Information System Security

diego abbo

Proceedings of the 11th International Conference on Enterprise Information

View PDFchevron_right

Problematizing the practice of policy

Hamish L Robertson

Journal of Nursing Management, 2016

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Representing Security Policies in Web Information Systems

abraham gomez

2005

View PDFchevron_right

Implementation of Information Security in the EU Information Systems

Ingrid Pappel

Lecture Notes in Computer Science, 2018

View PDFchevron_right

High-level specification of security systems

José L. Vivas

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)

View PDFchevron_right

Enterprise Architecture and Security Architecture Development

shahram jalaliniya

2011

View PDFchevron_right

Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations

Bashar Kabbani

2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014

View PDFchevron_right

International Working Group on Assurance Cases (for Security)

Sofia Guerra

IEEE Security & Privacy Magazine, 2006

View PDFchevron_right

Governing global information and communications policy

Derrick Cogburn

Telecommunications Policy, 2003

View PDFchevron_right

Access to Data and Employee Actions for Information Security

Justyna Żywiołek

Sciendo eBooks, 2019

View PDFchevron_right

Development of ISEE: An information security engineering environment

ahmad iqbal

Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 2009

View PDFchevron_right

3. Integration policies

Raivo Vetik

The Russian Second Generation in Tallinn and Kohtla-Järve, 2011

View PDFchevron_right

A systematic review of security requirements engineering

Daniel Mellado

Computer Standards & Interfaces, 2010

View PDFchevron_right

Towards a Systemic Approach for Information Security Risk Management

Christophe Feltus

2016 11th International Conference on Availability, Reliability and Security (ARES), 2016

View PDFchevron_right

Approaches to human security

SUNITA TARAI

View PDFchevron_right