Skip to search formSkip to main contentSkip to account menu

Information security

Known as: CIA (disambiguation), INFOSEC, CIA criteria 
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Information technology executives strive to align the actions of end users with the desired security posture of management and of… 
Highly Cited
2010
Highly Cited
2010
Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data… 
Highly Cited
2010
Highly Cited
2010
Employee noncompliance with information systems security policies is a key concern for organizations. If users do not comply with… 
Highly Cited
2009
Highly Cited
2009
The presentation “Cloud Computing: Benefits, risks and recommendations for information security” will cover some the most… 
Review
2006
Review
2006
Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims… 
Highly Cited
2003
Highly Cited
2003
This study examines the economic effect of information security breaches reported in newspapers or publicly traded US… 
Review
2003
Review
2003
  • J. V. Leeuwen
  • Lecture Notes in Computer Science
  • 2003
  • Corpus ID: 1207474
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software… 
Highly Cited
2002
Highly Cited
2002
This article presents an economic model that determines the optimal amount to invest to protect a given set of information. The… 
Highly Cited
2001
Highly Cited
2001
  • Ross J. Anderson
  • Seventeenth Annual Computer Security Applications…
  • 2001
  • Corpus ID: 8973086
According to one common view, information security comes down to technical measures. Given better access control policy models… 
Highly Cited
2001
Highly Cited
2001
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra…