Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,721,905 papers from all fields of science
Search
Sign In
Create Free Account
Security management
Known as:
Security Management Practices
Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Asset (computer security)
Event correlation
ISO/IEC 27001:2005
IT risk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A DTLS-based security architecture for the Internet of Things
G. Santos
,
Vinicius Tavares Guimaraes
,
Guilherme da Cunha Rodrigues
,
L. Granville
,
L. Tarouco
International Symposium on Computers and…
2015
Corpus ID: 20169191
The Internet of Things (IoT) is part of the Future Internet. IoT comprises a huge amount of devices (hereinafter called as…
Expand
2014
2014
Efficient implementation of chaotic image encryption in transform domains
Ensherah A. Naeem
,
M. Abd-Elnaby
,
+6 authors
F. El-Samie
Journal of Systems and Software
2014
Corpus ID: 43437398
Highly Cited
2012
Highly Cited
2012
A distributed reputation and trust management scheme for mobile peer-to-peer networks
B. Qureshi
,
G. Min
,
D. Kouvatsos
Computer Communications
2012
Corpus ID: 29598750
Highly Cited
2012
Highly Cited
2012
Security-constrained transmission expansion planning: A stochastic multi-objective approach
T. Akbari
,
A. Rahimi-Kian
,
M. Bina
2012
Corpus ID: 55650723
2009
2009
Blind information security strategy
F. O. Sveen
,
J. M. Torres
,
J. M. Sarriegi
Int. J. Crit. Infrastructure Prot.
2009
Corpus ID: 7670756
2009
2009
Towards supporting multiple virtual private computing environments on computational Grids
Lizhe Wang
,
W. Jie
Advances in Engineering Software
2009
Corpus ID: 8218762
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
Highly Cited
2002
Highly Cited
2002
Advanced features for enterprise-wide role-based access control
A. Kern
18th Annual Computer Security Applications…
2002
Corpus ID: 3014308
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful…
Expand
Highly Cited
1999
Highly Cited
1999
Internet security architecture
R. Molva
Comput. Networks
1999
Corpus ID: 1426559
Highly Cited
1998
Highly Cited
1998
Access control and key management for mobile agents
Volker Roth
,
Mehrdad Jalali-Sohi
Computers & graphics
1998
Corpus ID: 2579999
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE