A review of information security issues and respective research contributions

MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …

Securing distributed storage: challenges, techniques, and systems

V Kher, Y Kim - Proceedings of the 2005 ACM workshop on Storage …, 2005 - dl.acm.org
The rapid increase of sensitive data and the growing number of government regulations that
require longterm data retention and protection have forced enterprises to pay serious …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

The economics of information security investment

LA Gordon, MP Loeb - ACM Transactions on Information and System …, 2002 - dl.acm.org
This article presents an economic model that determines the optimal amount to invest to
protect a given set of information. The model takes into account the vulnerability of the …

The economic cost of publicly announced information security breaches: empirical evidence from the stock market

K Campbell, LA Gordon, MP Loeb… - Journal of Computer …, 2003 - content.iospress.com
This study examines the economic effect of information security breaches reported in
newspapers on publicly traded US corporations. We find limited evidence of an overall …

[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle

C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …

System and method for secure three-party communications

RH Nagel, DP Felsher, SM Hoffberg - US Patent 7,181,017, 2007 - Google Patents
(57) ABSTRACT A system and method for communicating information between a first party
and a second party, comprising iden tifying desired information, negotiating, through an inter …

[PDF][PDF] Ethical and social issues in the information age

JM Kizza - 2003 - ebooks.znu.edu.ua
Abstract When William Gibson first coined the word cyberspace in his novel Neuromancer,
he was describing the vision of a three-dimensional space of pure information consisting of …

The impact of denial‐of‐service attack announcements on the market value of firms

A Hovav, J D'Arcy - Risk Management and Insurance Review, 2003 - Wiley Online Library
The increase in security breaches in the last few years and the need to insure information
assets has created an intensified interest in information risk within organizations and for …

[图书][B] The governance of cyberspace: Politics, technology and global restructuring

B Loader - 1997 - books.google.com
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as
a result of state concern with security, crime and economic advantage. Through an …