Pub Date : 2017-03-19DOI: 10.1007/978-3-319-54380-2_6
M. Ferdous, F. Chowdhury, R. Poet
{"title":"A Hybrid Model of Attribute Aggregation in Federated Identity Management","authors":"M. Ferdous, F. Chowdhury, R. Poet","doi":"10.1007/978-3-319-54380-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_6","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_8
Shohreh Hosseinzadeh, S. Laurén, Sampsa Rauti, S. Hyrynsalmi, M. Conti, V. Leppänen
{"title":"Obfuscation and Diversification for Securing Cloud Computing","authors":"Shohreh Hosseinzadeh, S. Laurén, Sampsa Rauti, S. Hyrynsalmi, M. Conti, V. Leppänen","doi":"10.1007/978-3-319-54380-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_8","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_12
Zeyad S. Aaber, G. Wills, R. Crowder
{"title":"Protecting Document Outside Enterprise Network: A Confirmed Framework","authors":"Zeyad S. Aaber, G. Wills, R. Crowder","doi":"10.1007/978-3-319-54380-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_12","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_10
F. Yahya, R. Walters, G. Wills
{"title":"Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage","authors":"F. Yahya, R. Walters, G. Wills","doi":"10.1007/978-3-319-54380-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_10","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_5
M. Umer, M. Sher
{"title":"Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning","authors":"M. Umer, M. Sher","doi":"10.1007/978-3-319-54380-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_5","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_3
Yao-chi Lu
{"title":"The Relationship Between Public Budgeting and Risk Management: Competition or Driving?","authors":"Yao-chi Lu","doi":"10.1007/978-3-319-54380-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_3","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_9
Jose Romero-Mariona, Roger A. Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, J. Miguel, Lawrence Kerr, M. Major, Jorge Alvarez
{"title":"An Approach to Organizational Cybersecurity","authors":"Jose Romero-Mariona, Roger A. Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, J. Miguel, Lawrence Kerr, M. Major, Jorge Alvarez","doi":"10.1007/978-3-319-54380-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_9","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_4
A. Ghaffari, Amin Hosseinian Far, A. S. Akbari
{"title":"Iris Biometrics Recognition in Security Management","authors":"A. Ghaffari, Amin Hosseinian Far, A. S. Akbari","doi":"10.1007/978-3-319-54380-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_4","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-30DOI: 10.1007/978-3-319-54380-2_11
M. Alassafi, R. Hussain, Ghada Ghashgari, R. Walters, G. Wills
{"title":"Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud","authors":"M. Alassafi, R. Hussain, Ghada Ghashgari, R. Walters, G. Wills","doi":"10.1007/978-3-319-54380-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_11","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}