نتایج جستجو برای: assurance region
تعداد نتایج: 557777 فیلتر نتایج به سال:
Informed decisions about security depend upon a complex set of factors related to both assurance and risk. In this paper we argue for a new definition of assurance, specifically describing its relationship to measurements of risk or security. The following definition expands the traditional definition of assurance to include a broad range of evidence, while narrowing the scope to a specific typ...
To improve the security of software systems, we need to improve the software development processes used to produce them. Software security assurance cases have been proposed as a way of establishing security properties of software at different phases of the software development lifecycle; however, these assurance cases are difficult to write, communicate and introduce into an already burdened s...
1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...
In this paper some of the aspects of implementing measures for quality assurance of e-learning in developing countries are discussed. Also the main problems of establishing quality assurance of e-learning are illustrated. The advantages of adopting international measures of quality assurance in those countries together with several recommendations for the future and our conclusion are then given.
1. What is the quality of Agile Software, importantly, how we can evaluate the quality of Agile Software? 2. Can Agile assure the quality under time pressure and with unstable requirements? 3. What are the best ways to assure the quality of Agile Software? 4. Different organizations interpret words like Agile and iterative in different ways. Therefore, another question is how do organizations u...
The goals of Kluwer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security ...
The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...
The evaluation of a conceptual model, which is an outcome of a qualitative research, is an arduous task due to the lack of a rigorous basis for evaluation. Overcoming this challenge, the paper at hand presents a detailed example of a multifaceted evaluation of a Reference Model of Information Assurance & Security (RMIAS), which summarises the knowledge acquired by the Information Assurance & Se...
As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید