Security management

Known as: Security Management Practices 
Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Information technology has dramatically increased online business opportunities; however these opportunities have also created… (More)
  • table 1
  • table 1
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments… (More)
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The paramount complexity of enterprise in formation leads to hard-to-deal security management issues and system configurations… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Purpose – To provide useful references for manufacturing industry which guide the linkage of business strategies and performance… (More)
  • table I
  • table II
  • table III
  • table IV
  • table V
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper critically analyses the foundations of three widely advocated information security management standards (BS7799, GASPP… (More)
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Roles are a powerful and policy neutral concept for facilitating distributed systems management and enforcing access control… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
ions. A modular abstraction can be included in many places even though it is never directly exposed to a user. The invoice… (More)
Is this relevant?