Cerebrovascular 发表于 2025-3-28 16:11:37

A Secure Multi-Sited Version Control System revision history of software and facilitate software evolution. In this paper we look into the security requirements of such multi-sited version control systems. We identify the security deficiencies in current systems and propose a new framework for secure multi-sited version control.

Fallibility 发表于 2025-3-28 18:54:22

From Security Culture to Effective E-Security Solutionsll acceptance of an international e-security framework. The validity of such model requires a challenging multidimensional approach of e-security. Several reflection axis and recommendations to guide the conceptualization of a unified e-security framework are proposed.

myocardium 发表于 2025-3-28 23:19:21

http://reply.papertrans.cn/47/4692/469167/469167_43.png

AGOG 发表于 2025-3-29 05:41:25

An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraintsation specifies an operation to be monitored, such as modifying a data value. The semantic analysis process applies a concept known as object-centered conditions during the compilation of ALICE rules to detect semantically incorrect rules at compile time.

B-cell 发表于 2025-3-29 08:13:47

Book 2004T personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions: what precisely do business managers need in order to have confidence in the integrity of their information systems and their data and what are the challenges IT i

OMIT 发表于 2025-3-29 12:57:57

http://reply.papertrans.cn/47/4692/469167/469167_46.png

陶器 发表于 2025-3-29 16:54:53

http://reply.papertrans.cn/47/4692/469167/469167_47.png

Lethargic 发表于 2025-3-29 22:24:50

Role of Certification in Meeting Organisation Security Requirementsvided to stakeholders is secure and correct. This paper explores briefly the two main ISO standards for security — the Common Criteria and the 7799 family. It identifies current limitations in the standards and suggests area where the standards could be developed to assist everyone in meeting the future security needs

断言 发表于 2025-3-30 03:21:17

https://doi.org/10.1007/b116855Audit; COBIT; Processing; SAP; Unified Modeling Language (UML); computer science; data security; informatio

渐强 发表于 2025-3-30 06:46:03

Information Security Governance using ISO 17799 and COBITThis paper discusses a project in which a mapping between ISO 17799 and COBIT’s section DS 5 is being created. The purpose of this mapping is to synchronize these two documents to a certain extent, to make it easier to use both in an integrated way for information security governance and management.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Integrity and Internal Control in Information Systems VI; IFIP TC11 / WG11.5 S Sushil Jajodia,Leon Strous Book 2004 IFIP International Fede