SSE-CMM

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM

this research was conducted to find out the level of information security in organization to give recommendations improvements in information security management at the organization. This research uses the ISO 27002 by involving the entire clause that exists in ISO 27002 check-lists. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses of ISO...

متن کامل

Integration of COBIT, Balanced Scorecard and SSE- CMM as a strategic Information Secur ity Management (ISM) framework

Abstr act The purpose of this study is to explore the integrated use of Control Objectives for Information Technology (COBIT) and Balanced Scorecard (BSC) frameworks for strategic information security management (ISM). The goal is to investigate the strengths, weaknesses, implementation techniques, and potential benefits of such an integrated framework. This integration is achieved by “bridging...

متن کامل

Efficient No-dictionary Verifiable SSE

In the model of no-dictionary verifiable searchable symmetric encryption (SSE) scheme, a client does not need to keep the set of keywords W in the search phase, where W is called a dictionary. Still a malicious server cannot cheat the client by saying that “your search word w does not exist in the dictionary W” when it exists. In the previous such schemes, it takes O(logm) time for the server t...

متن کامل

Interval Arithmetic Using SSE-2

We present an implementation of double precision interval arithmetic using the single-instruction-multiple-data SSE-2 instruction and register set extensions. The implementation is part of a package for exact real arithmetic, which defines the interval arithmetic variation that must be used: incorrect operations such as division by zero cause exceptions and loose evaluation of the operations is...

متن کامل

To CMM or Not to CMM? Antecedents and Consequences of CMM Certification in the Indian Offshore Industry

Third-party process certification programs such as the Capability Maturity Model (CMM) and the ISO 9000 set of standards have been popular in the IT outsourcing industry as a means of differentiation and quality assurance. Specifically, prior theory in signaling indicates that in markets where there is significant information asymmetry between vendors and potential clients, firms perceive value...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Datenschutz und Datensicherheit - DuD

سال: 2007

ISSN: 1614-0702,1862-2607

DOI: 10.1007/s11623-007-0303-x