![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessMinimizing incident response time in real-world scenarios using quantum computing
The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, an...
-
Chapter and Conference Paper
Cybersecurity in the Maritime Sector: A Point of Analysis in Risk Management
Regardless of the field of action (civilian, military, …), cybersecurity risks for the maritime sector are increasingly varied and their attack methodologies more innovative. The appearance of policies from di...
-
Article
Open AccessTowards an integrated risk analysis security framework according to a systematic analysis of existing proposals
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The availability of these systems is now vital for the protecti...
-
Article
Open AccessImproving security in NoSQL document databases through model-driven modernization
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structur...
-
Chapter and Conference Paper
Definition and Verification of Security Configurations of Cyber-Physical Systems
The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety ...
-
Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
How the Conceptual Modelling Improves the Security on Document Databases
Big Data is becoming a prominent trend in our society. Ever larger amounts of data, including sensitive and personal information, are being loaded into NoSQL and other Big Data technologies for analysis and pr...
-
Living Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
A Framework for Secure Migration Processes of Legacy Systems to the Cloud
The emergence of cloud computing as a major trend in the IT industry signifies that corporate users of this paradigm are confronted with the challenge of securing their systems in this new environment. An impo...
-
Chapter and Conference Paper
Eliciting Security Requirements for Business Processes of Legacy Systems
The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, ...
-
Article
Open AccessAn analysis of security issues for cloud computing
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...
-
Chapter and Conference Paper
Analysis of Application of Security Patterns to Build Secure Systems
Both new technology business models and the new tendencies in the field of computing are forcing organizations to undergo a constant evolution in order to maintain their competitiveness in markets. This evolut...
-
Chapter and Conference Paper
Towards the Secure Modelling of OLAP Users’ Behaviour
Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage histor...
-
Chapter and Conference Paper
Security Culture in Small and Medium-Size Enterprise
The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...
-
Chapter and Conference Paper
Applicability of Security Patterns
Information Security has become one of the fundamental mainstays in organizations owing to the ever-increasing cyber attacks against them in recent years. Both the designers of security mechanisms and the secu...
-
Chapter and Conference Paper
Building ISMS through the Reuse of Knowledge
The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size E...
-
Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
Systems based on Grid computing have not traditionally been developed through suitable methodologies and have not taken into account security requirements throughout their development, offering technical secur...
-
Chapter and Conference Paper
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated i...
-
Chapter and Conference Paper
Security Requirements Management in Software Product Line Engineering
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current prod...