Добірка наукової літератури з теми "Security-oriented management"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security-oriented management".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security-oriented management"
Yu, Zhi Wei, and Zhong Yuan Ji. "Study on Security Management-Oriented Business Process Model." Advanced Materials Research 267 (June 2011): 183–88. http://dx.doi.org/10.4028/www.scientific.net/amr.267.183.
Повний текст джерелаNiu, Qiu Na. "Distributed Group Key Management for Secure Electronic Communication." Applied Mechanics and Materials 385-386 (August 2013): 1591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1591.
Повний текст джерелаMomot, Tetiana, Olena Filonych, Antonina Kosiak, and Olena Lobach. "BALANCED SCORECARD OF SAFETY-ORIENTED MANAGEMENT FOR THE CONSTRUCTION INDUSTRY ENTERPRISES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 54–62. http://dx.doi.org/10.30837/itssi.2021.16.054.
Повний текст джерелаGandotra, Vandana, Archana Singhal, and Punam Bedi. "Threat-Oriented Security Framework: A Proactive Approach in Threat Management." Procedia Technology 4 (2012): 487–94. http://dx.doi.org/10.1016/j.protcy.2012.05.078.
Повний текст джерелаBedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Threat-oriented security framework in risk management using multiagent system." Software: Practice and Experience 43, no. 9 (June 7, 2012): 1013–38. http://dx.doi.org/10.1002/spe.2133.
Повний текст джерелаDudziak-Gajowiak, Dominika, Grzegorz Kolaczek, and Krzysztof Juszczyszyn. "Solving problems relating to ICT security management systems including various characteristics of the environment and system." Scientific Journal of the Military University of Land Forces 192, no. 2 (April 1, 2019): 321–34. http://dx.doi.org/10.5604/01.3001.0013.2607.
Повний текст джерелаPrimost, Stephen. "Applying Security within a Service-Oriented Architecture." Information Security Journal: A Global Perspective 17, no. 1 (March 24, 2008): 26–32. http://dx.doi.org/10.1080/19393550801929257.
Повний текст джерелаZúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.
Повний текст джерелаCherevko, Oleksandr, Serhiy Nazarenko, Nataliia Zachosova, and Nataliia Nosan. "Financial and economic security system strategic management as an independent direction of management." SHS Web of Conferences 65 (2019): 03001. http://dx.doi.org/10.1051/shsconf/20196503001.
Повний текст джерелаvon Solms, S. H., and Isak van der Merwe. "The management of computer security profiles using a role-oriented approach." Computers & Security 13, no. 8 (January 1994): 673–80. http://dx.doi.org/10.1016/0167-4048(94)90049-3.
Повний текст джерелаДисертації з теми "Security-oriented management"
Momot, T. V., I. O. Filatova, and D. T. Momot. "Customer relationship management in the system of stakeholders-oriented corporate security." Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/10138.
Повний текст джерелаSkogsrud, Halvard Computer Science & Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.
Повний текст джерелаDuma, Claudiu. "Security and Efficiency Tradeoffs in Multicast Group Key Management." Licentiate thesis, Linköping : Univ, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5695.
Повний текст джерелаMouratidis, Haralambos. "A security oriented approach in the development of multiagent systems : applied to the management of the health and social care needs of older people in England." Thesis, University of Sheffield, 2004. http://etheses.whiterose.ac.uk/14864/.
Повний текст джерелаBou, Nassar Pascal. "Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00828598.
Повний текст джерелаEriksson, Maria. "WEB SERVICES FÖR MOBILAPPLIKATIONER : Utveckling av säkra RESTful web services för mobilapplikationer." Thesis, Örebro universitet, Akademin för naturvetenskap och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-15879.
Повний текст джерелаRapporten beskriver utvecklandet av en RESTful web service för mobilapplikationer. Web servicen tillgängliggör resurser från ett befintligt system som kallas kompetensdatabasen. Kompetensdatabasen innehåller information om konsulters kompetenser och de uppdrag som utförts vid IT-konsultföretaget Nethouse AB. Web servicen utvecklades enligt principerna för REST och ROA (Resource Oriented Architecture) vilket innebär ett fokus på att tillgängliggöra resurser. Resurserna görs nåbara genom HTTP-protokollet och dess metoder, det vill säga samma tekniker som används på webben. Stor vikt har lagts på att designa systemet enligt dessa principer. För att servicen inte skulle läcka information till konkurrenter eller bryta mot personuppgiftslagen behövde någon form av säkerhetslösning implementeras. En autentiseringsmodell togs fram för att göra systemet nåbart enbart för anställda vid företaget.
Fan, Yang, Hidehiko Masuhara, Tomoyuki Aotani, Flemming Nielson, and Hanne Riis Nielson. "AspectKE*: Security aspects with program analysis for distributed systems." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4136/.
Повний текст джерелаTsai, Chiang-nan, and 蔡江楠. "Study on Architecture-Oriented Information Security Management Model." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/czrcgz.
Повний текст джерела國立中山大學
資訊管理學系研究所
97
Information security, sometimes referred as enterprise security, plays a very important and professional role in the enterprises. Therefore, information security management is getting more and more popularity among the enterprises in recent years. Several aspects on information, such as technical documents, research and development plans, product quotations, are considered as core assets in one company. How to effectively manage and realize an information security system has become a key for a company’s survival. The international information security management standard, ISO 27001:2005, which includes personnel security, technology security, physical security and management security has been promulgated. When bringing in an information security management system, a company usually embraces the process-oriented approach which treats the system’s structure view and behavior view separately. Separating structure view from behavior view during the planning phase may cause many difficulties, such as uneven distribution of resources, poor safety performance, bad risk management, poor system management and so on, when working on the later realization and verification phase of the information security management system’s construction. Up to date, there is no enterprise architecture theory for information security management system. This research utilizes architecture-oriented modeling methodology so that structure view and behavior view are coalesced when decomposing the information security management system to obtain structural elements and behaviors deriving from interactions among these structure elements. By adopting structure behavior coalescence, abbreviated as SBC, which includes “architecture hierarchy diagram", "structure element diagram", "structure element service diagram", "structure element connection diagram", "structure behavior coalescence diagram", and "interactive flow diagram", this research constructs a complete architecture-oriented information security management model, abbreviated as AOISMM. This research is the first study using architecture-oriented approach to construct the information security management system. Also, AOISMM solves many difficulties caused by the process-oriented approach when constructing information security management systems. These are the contributions of this research.
Lu, Woei-Yuan, and 呂瑋原. "Study on Architecture-Oriented Enterprise Security Management Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/57922753660149789660.
Повний текст джерела國立中山大學
資訊管理學系研究所
103
Due to the trend of globalization, international trade, and a variety of business activities, companies must be able to provide timely, safely, and integrity information disclosure for interested party of enterprise . Therefore, the establishment of enterprise security management such as the International Organization for Standardization (ISO) becomes a key issue for any company to get involved in international trade. The main purpose of this research is to construct an architecture-oriented model for enterprise security management according to ISO 27001 : 2005 information security management system(ISMS)requirements. This model will combine the components and component operations of the department and software systems, in order to describe in detail about the interaction relationship and information flow of enterprise security management. In this thesis, we construct an architecture-oriented enterprise security management model (AOESMM) based on theory and methods of enterprise architecture. This model uses the structure-behavior coalescence approach with six fundamental diagrams: the “architecture hierarchy diagram,” the “framework diagram,” the “component operation diagram,” the “component connection diagram, the “structure-behavior coalescence diagram,” and the “interaction flow diagram”. AOESMM shall allow organizational structures, systems operations, and information flow, with a great deal of simple, clear, and easy communication features.
Lin, Jing-Han, and 林京漢. "Study on Architecture-Oriented Information Security Risk Management Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/hvqty6.
Повний текст джерела正修科技大學
資訊管理研究所
103
In this study, we adopt the structure behavior coalescence methodology to construct an architecture-oriented information security risk management model (AOISRMM), which is integrated structure and behavior of the risk management model. AOISRMM solves many difficulties caused by the process-oriented approach in ISO 27001:2013 of information security risk assessment such as uneven distribution of resources, poor safety performance and high risk. We find out the vice president’s office, information security consultant, project manager and risk management system are the key roles for the success of the risk management from structure behavior coalescence diagram. The feedback mechanism in the enterprise is essential to report and respond to the incidents for reducing the risk. AOISRMM represents multiple views of information security risk management by integrating the structure and behavior of the risk management. We conclude that AOISRMM, being an integration model, enables enterprise organization, IT system, internal risk management processes to be a single interface to the vice president and department heads. The staffs can effectively understand the whole picture of information security risk management through AOISRMM, which shall clarify the duties for each unit and flexible sources allocation for the enterprise. Also AOISRMM have a good communication effect of organization and external environment.
Книги з теми "Security-oriented management"
Lorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Знайти повний текст джерелаHsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.
Знайти повний текст джерелаde, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.
Знайти повний текст джерела1957-, Patel D., Sutherland Jeffrey Victor, and Miller J, eds. Business object design and implementation II: OOPSLA '96, OOPSLA '97, and OOPSLA '98 workshop proceedings. London: Springer, 1998.
Знайти повний текст джерелаUnited States. Government Accountability Office. Results-oriented government: Practices that can help enhance and sustain collaboration among federal agencies : report to the Chairman, Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: Govt. Accountability Office, 2005.
Знайти повний текст джерелаErnesto, Pimentel, Zavattaro Gianluigi, and SpringerLink (Online service), eds. Service-Oriented and Cloud Computing: First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Знайти повний текст джерелаMalik, Zaki. Trust Management for Service-Oriented Environments. Boston, MA: Springer-Verlag US, 2009.
Знайти повний текст джерелаErnesto, Damiani, Maciaszek Leszek, Missikoff Michele, Parkin Michael, and SpringerLink (Online service), eds. Business System Management and Engineering: From Open Issues to Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Знайти повний текст джерелаU.S. Department of Justice Community Oriented Policing Services Office: Hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, February 29, 2012. Washington: U.S. G.P.O., 2012.
Знайти повний текст джерелаBertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2014.
Знайти повний текст джерелаЧастини книг з теми "Security-oriented management"
Cannady, James. "Security Models for Object-Oriented Databases." In Data Management, 283–91. 3rd ed. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9780429114878-28.
Повний текст джерелаSoomro, Inam, and Naved Ahmed. "Towards Security Risk-Oriented Misuse Cases." In Business Process Management Workshops, 689–700. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36285-9_68.
Повний текст джерелаSowa, Sebastian, Lampros Tsinas, and Roland Gabriel. "BORIS –Business ORiented management of Information Security." In Managing Information Risk and the Economics of Security, 81–97. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09762-6_4.
Повний текст джерелаPark, Wonjoo, Jaehoon Nah, and Sungwon Sohn. "A Study of Security Association Management Oriented to IP Security." In Information Networking: Wireless Communications Technologies and Network Applications, 381–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45801-8_37.
Повний текст джерелаStocker, Thomas, and Frank Böhr. "IF-Net: A Meta-Model for Security-Oriented Process Specification." In Security and Trust Management, 191–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7_13.
Повний текст джерелаBrossard, David, and Maurizio Colombo. "Common Capabilities for Trust and Security in Service Oriented Infrastructures." In Trust Management III, 310–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02056-8_22.
Повний текст джерелаBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Digital Identity Management and Trust Negotiation." In Security for Web Services and Service-Oriented Architectures, 79–114. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_5.
Повний текст джерелаSabir Idrees, Muhammad, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira, Herve Grall, and Mario Südholt. "Evolving Security Requirements in Multi-layered Service-Oriented-Architectures." In Data Privacy Management and Autonomous Spontaneus Security, 190–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28879-1_13.
Повний текст джерелаZemtsov, I., and L. Astakhova. "Object-Oriented Situational Approach to Enterprise Information Security Management." In Lecture Notes in Electrical Engineering, 591–600. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71119-1_58.
Повний текст джерелаMouheb, D., C. Talhi, M. Nouh, V. Lima, M. Debbabi, L. Wang, and M. Pourzandi. "Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML." In Software Engineering Research, Management and Applications 2010, 197–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13273-5_13.
Повний текст джерелаТези доповідей конференцій з теми "Security-oriented management"
Chen, Ke, Ying Wang, Peng Yu, and Naling Li. "Security-Oriented Network Slice Backup Method." In 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2021. http://dx.doi.org/10.23919/apnoms52696.2021.9562592.
Повний текст джерелаAlmorsy, Mohamed, John Grundy, and Amani S. Ibrahim. "TOSSMA: A Tenant-Oriented SaaS Security Management Architecture." In 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). IEEE, 2012. http://dx.doi.org/10.1109/cloud.2012.146.
Повний текст джерелаAmbhore, Premchand B., B. B. Meshram, and V. B. Waghmare. "A Implementation of Object Oriented Database Security." In 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007). IEEE, 2007. http://dx.doi.org/10.1109/sera.2007.17.
Повний текст джерелаMenzel, Michael, Ivonne Thomas, and Christoph Meinel. "Security Requirements Specification in Service-Oriented Business Process Management." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.90.
Повний текст джерела"A RECONFIGURABLE SECURITY MANAGEMENT SYSTEM WITH SERVICE ORIENTED ARCHITECTURE." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001716903570362.
Повний текст джерелаWang, Jiawei, Yuejun Zhang, Pengjun Wang, Zhicun Luan, Xiaoyong Xue, Xiaoyang Zeng, and Qiaoyan Yu. "An Orthogonal Algorithm for Key Management in Hardware Obfuscation." In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2019. http://dx.doi.org/10.1109/asianhost47458.2019.9006703.
Повний текст джерелаPeng, Wang, Chen Yingwu, Chen Sen, and Ye Guoqing. "ISRMDSS: An information security risk management oriented multi-agent system." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6014739.
Повний текст джерелаAbie, Habtamu. "Adaptive security and trust management for autonomic message-oriented middleware." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336915.
Повний текст джерелаRizvi, Syed, Jungwoo Ryoo, John Kissell, and Bill Aiken. "A stakeholder-oriented assessment index for cloud security auditing." In IMCOM '15: The 9th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2701126.2701226.
Повний текст джерелаXu Lei. "Cyber-security analysis for process control oriented information system." In 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC). IEEE, 2011. http://dx.doi.org/10.1109/aimsec.2011.6010318.
Повний текст джерелаЗвіти організацій з теми "Security-oriented management"
De Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.
Повний текст джерелаSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.
Повний текст джерела