Buscar
Mostrando ítems 1-10 de 3397
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...
Security and defence policy documents: a new dataset
(2021)
Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This ...
FORTUNA-A framework for the design and development of hardware-based secure systems
(Elsevier Science IncNew YorkEUA, 2013)
Security strategy for vulnerabilities prevention in the development of web applications
(IOP Publishing, 2019)
In recent years, Higher Education Institutions through their Systems departments have
strengthened security for the development of applications on web environment, because of their
vulnerability to possible computer ...
Gestão da segurança da informação no ambiente do TCE/RN: uma abordagem em conformidade com requisitos legais
(Universidade Federal do Rio Grande do NorteBrasilUFRNResidência em Tecnologia da Informação, 2021)
Política de segurança da informação: uma estratégia para garantir a proteção e a integridade das informações arquivísticas no Departamento de Arquivo Geral da UFSM
(Universidade Federal de Santa MariaBRHistóriaUFSMPrograma de Pós-Graduação em Patrimônio Cultural, 2012-12-06)
Presents a study on information security in order to propose an Information Security
Policy for the Department of General Archives (DAG), Federal University of Santa Maria
(UFSM) as a way of enabling the protection, ...
Constructing an architecture-based cybersecurity solution for a system
(2023-01-19)
Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a ...
PUPSI :uma proposta de processo unificado para políticas de segurança da informação
(Universidade Federal do Rio Grande do NorteBRUFRNPrograma de Pós-Graduação em Sistemas e ComputaçãoCiência da Computação, 2004-04-30)
The way to deal with information assets means nowadays the main factor not only for the success but also for keeping the companies in the global world. The number of information security incidents has grown for the last ...