Context-Aware Access Control in Ubiquitous Computing (CRAAC) Submitted by rest1 on Wed, 12/17/2025 - 11:25 Read more about Context-Aware Access Control in Ubiquitous Computing (CRAAC)
An Introduction to Information System Risk Management Submitted by rest1 on Wed, 12/17/2025 - 11:25 Read more about An Introduction to Information System Risk Management
A case study comparison of the analytic hierarchy process and a fuzzy decision methodology Submitted by rest1 on Wed, 12/17/2025 - 11:25 Read more about A case study comparison of the analytic hierarchy process and a fuzzy decision methodology
Information security strategies: Towards an organizational multi-strategy perspective Submitted by rest1 on Wed, 12/17/2025 - 11:25 Read more about Information security strategies: Towards an organizational multi-strategy perspective
Managing Risk and Information Security Submitted by rest1 on Wed, 12/17/2025 - 11:25 Read more about Managing Risk and Information Security
The management of security in Cloud computing Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about The management of security in Cloud computing
Current challenges in information security risk management Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Current challenges in information security risk management
Search Methodologies Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Search Methodologies
Computational Science and Its Applications – ICCSA 2004 Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Computational Science and Its Applications – ICCSA 2004