Rogers, 1987
ViewHTML| Publication | Publication Date | Title |
|---|---|---|
| Herrmann et al. | Security requirement analysis of business processes | |
| JP2015534138A (en) | Method and system for secure authentication and information sharing and analysis | |
| Schou et al. | Information Assurance Handbook | |
| Goodwin et al. | Developing a National strategy for CyberSecurity | |
| US20250317469A1 (en) | Systems and methods for verification and validation of cyber resilience | |
| Ambhire et al. | Information security in banking and financial industry | |
| Haber et al. | Regulatory compliance | |
| Deane et al. | The Official (ISC) 2 CISSP CBK Reference | |
| Morris et al. | Cybersecurity as a Service | |
| Fumy et al. | Enterprise security: IT security solutions--concepts, practical experiences, technologies | |
| Yamany et al. | Intelligent security and access control framework for service-oriented architecture | |
| Rogers | An Overview of the Candware Program | |
| Cazemier et al. | Information Security Management with ITIL® V3 | |
| Ishaya et al. | Trust development and management in virtual communities | |
| Demchenko et al. | Big Data Security and Compliance, Data Privacy Protection | |
| Salih et al. | Iot-enabled cloud storage data access control model based on blockchain technology | |
| Savolainen | Evaluating security and privacy of SaaS service | |
| Zhang et al. | Controlling information risk in E-commerce | |
| Hussain | The design and applications of a privacy-preserving identity and trust-management system | |
| Jordan | Cyber infrastructure protection | |
| Wairagade | Role of Identity and Access Management in Corporate Management | |
| Kok | Cloud computing & confidentiality | |
| Lampikari | Secure Cloud Implementation in Governmental Organisations | |
| Maria Bruma | Using Cloud Control Matrix to evaluate trust in cloud providers | |
| Benabdallah et al. | Security issues in E-government models: what governments should do? |