Computer security methodology: Risk analysis and project definition
References (18)
- et al.
Framework of a methodology for the life cycle of computer security in an organization
Comput. Secur.
(1989) Computer security policy: important issues
Comput. Secur.
(1988)The quantification of risk in aiding management decisions
- et al.
A conceptual methodology for evaluating security requirements for data assets
Comput. Secur.
(1983) - et al.
End-user computing environments—finding a balance between productivity and control
Inform. Manage.
(August 1987) Evaluating the risks of computer fraud and error
Comput. Secur.
(1983)Information systems security: management success factors
Comput. Secur.
(February 1987)Computer and network security policy: a challenge to organizations' computer security
Discussing security with top management
Comput. Secur.
(1988)
Cited by (12)
Stochastic comparisons for rooted butterfly networks and tree networks, with random environments
2011, Information SciencesCitation Excerpt :Stochastic orderings have been used as instruments both to compare and to bound the waiting times and other random amounts arising from queueing networks (see e.g., [1,11,26,28,30,31,40,41,43]). In addition, stochastic orderings have been applied in computer networks (see e.g., [8,2]). Several probabilistic bounds can be obtained from stochastic comparisons by comparing with some threshold random variables.
A security model for distributed product data management system
2003, Computers in IndustryA risk control strategy for corporate computer operations
1995, Computer Audit UpdateA comparative framework for risk analysis methods
1993, Computers and SecurityRisk analysis as a source of professional knowledge
1991, Computers and SecurityDesigning a Risk Assessment Tool for Artificial Intelligence Systems
2021, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- 1
received a B.S.c. (computer science) degree at the University of Stellenbosch, South Africa, in 1980. In 1989 she received a Masters degree at the Rand Afrikaans University, Johannesburg, South Africa, and she is currently working towards a Ph.D. degree in computer science at the same university. She has worked as a technical support analyst at major Prime installations. While working for her Masters degree she applied her research by working as a consultant in the field of computer security.
- 2
received a B.S.c. (computer science) degree at the Rand Afrikaans University, Johannesburg, South Africa in 1978. In 1980 he received an M.Sc. degree in computer science at the same university, his dissertation involved an in-depth study of all the logical aspects of computer security. Part of this research was published in Computers & Security (November 1983) under the title “Selection Process for Security Packages”. In 1985 he received a Ph.D. (computer science) degree with a thesis titled “The Development of a Specification Language for a Computer Security System”. Part of the research done for his Ph.D. degree was published in Computers & Security under the same title. He also delivered papers at IFIP/SEC'84 and IFIP/ SEC'84. He gained practical experience by working as a computer consultant as well as manager of a large information centre. He is currently a professor in computer science at the Rand Afrikaans University, South Africa.