Management of Security and Security for Management Systems
نویسندگان
چکیده
منابع مشابه
Security Management in Intranet Systems
The introduction of the .NET platform by Microsoft and the growing popularity of Internet-based systems have caused major security concerns for system developers. Appropriate information security techniques must be used by system administrators to reduce the risk of information disasters. The purpose of this research paper is to examine possible information security problems and recommend possi...
متن کاملDistributed Self Management for Distributed Security Systems
Distributed system as e.g. artificial immune systems, complex adaptive systems, or multi-agent systems are widely used in Computer Science, e.g. for network security, optimisations, or simulations. In these systems, small entities move through the network and perform certain tasks. At some time, the entities move to another place and require therefore information where to move is most profitabl...
متن کاملStructured Systems Economics for Security Management
We develop an ontological account of information security architectures that is inspired by economic models of trade-offs between confidentiality, integrity, and availability. Our approach clarifies the nature of the trade-offs by making a clear distinction between declarative and operational concepts in security. We integrate this approach with a semantically justified mathematical systems mod...
متن کاملlangauge needs analysis of undergraduate business management and economics students
the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...
15 صفحه اولPlanning for Security Management
Security Management is a key issue in distributed computer systems. Resources and data need to be protected against unauthorized access, manipulation and malicious intrusions that render a system unreliable or unusable. The complexity of the task calls for the design of intelligent support systems that aid system administrators in the detection and/or prevention of intrusions. For this purpose,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Systems Management
سال: 2010
ISSN: 1064-7570,1573-7705
DOI: 10.1007/s10922-010-9172-y