Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,835,233 papers from all fields of science
Search
Sign In
Create Free Account
Security management
Known as:
Security Management Practices
Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Asset (computer security)
Event correlation
ISO/IEC 27001:2005
IT risk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Obstacles towards adoption of mobile banking in Tanzania: a review
Joel Rumanyika
2015
Corpus ID: 22743730
Adoption of mobile banking in Tanzania is negatively affected by factors such as theft of mobile handsets, poor network coverage…
Expand
2014
2014
Efficient implementation of chaotic image encryption in transform domains
Ensherah A. Naeem
,
M. Abd-Elnaby
,
+6 authors
F. El-Samie
Journal of Systems and Software
2014
Corpus ID: 43437398
2011
2011
A Cloud Computing Infrastructure on Heterogeneous Computing Resources
Baomin Xu
,
Ning Wang
,
Chunyan Li
Journal of Computers
2011
Corpus ID: 11683708
Cloud computing is a state-of-the-art distributed computing paradigm which can support on-demand service sharing with flexibility…
Expand
2009
2009
Towards supporting multiple virtual private computing environments on computational Grids
Lizhe Wang
,
W. Jie
Advances in Engineering Software
2009
Corpus ID: 8218762
2009
2009
The integrated security system of the Senate of the Italian Republic
Giovanni Contardi
,
F. Garzia
,
R. Cusani
43rd Annual International Carnahan Conference on…
2009
Corpus ID: 16835571
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
2003
2003
A model for deriving information security control attribute profiles
H. V. D. Haar
,
R. V. Solms
Computers & security
2003
Corpus ID: 36597881
Highly Cited
2002
Highly Cited
2002
Advanced features for enterprise-wide role-based access control
A. Kern
18th Annual Computer Security Applications…
2002
Corpus ID: 3014308
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful…
Expand
Highly Cited
1998
Highly Cited
1998
Access control and key management for mobile agents
Volker Roth
,
Mehrdad Jalali-Sohi
Computers & graphics
1998
Corpus ID: 2579999
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE