What Is Information Assurance ?

نویسندگان

  • Walter L. McKnight
  • Carol A. Sledge
  • Andrew Moore
  • Adam Kolawa
  • Peter Baxter
  • John A. Rolando
  • Alan Roberts
چکیده

ion, parameterization

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Assurance in B2C e-Commerce Transactions: A Process-Oriented Framework and Empirical Analysis of Websites using Semantic Networks

What aspects of information assurance can be identified in Business-to-Consumer (B-toC) online transactions? The purpose of this research is to build a theoretical framework for studying information assurance based on a detailed analysis of academic literature for online exchanges in B-to-C electronic commerce. Further, a semantic network content analysis is conducted to analyze the representat...

متن کامل

System of Systems Software Assurance

Under DoD sponsorship, the Software Engineering Institute has initiated a research project on system of systems (SoS) software assurance. The project’s overall goal is to provide appropriate methods and tools to meet the assurance challenges of systems of systems. To focus the research, the project is specifically addressing SoS assurance issues that arise in large-scale adaptive information ma...

متن کامل

Panel: Teaching Undergraduate Information Assurance

As the importance of information assurance and computer security has become recognized, the number of institutions teaching these subjects in their undergraduate curriculum has grown. But methods of integrating this material into the undergraduate program are varied, as are the methods used to teach the material itself. Two key issues highlight the differences in instructional methods and techn...

متن کامل

DoD Information Assurance and Agile: Challenges and Recommendations Gathered Through Interviews with Agile Program Managers and DoD Accreditation Reviewers

ix 1 Overview and Scope 1 2 Research Approach 3 3 Overview of Highlights from Brief Literature Search 4 4 Summary of Recommendations from Interviews 7 5 Interview Findings: Introduction 15 6 Interview Findings: Challenges from the Agile Program Manager Perspective 17 7 Interview Findings: Challenges from the Accrediting Authority Perspective 22 8 Implications of Existing Information Assurance P...

متن کامل

Logic Design for Access Control, Security, Trust, and Assurance

Designs created by hardware and software engineers are often part of larger systems where confidentiality, integrity, and availability of information and other resources is a primary concern. Whether the system is a military one where assurance of mission-critical capabilities is paramount, or the system delivers financial services where assurances of integrity of financial data and transaction...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002