2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management 2007
DOI: 10.1109/bdim.2007.375015
|View full text |Cite
|
Sign up to set email alerts
|

Elevating the Discussion on Security Management: The Data Centric Paradigm

Abstract: Corporate decision makers have normally been Security-conscious enterprises understand that disconnected from the details of the security management managing Information Technology (IT) Security Risk is infrastructures of their organizations. The management of the critical element of their business resilience strategy. security resources has traditionally been the domain of a Lack of proper IT security controls places the entire small group of skilled and technically savvy professionals, enterprise at great ri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…These issues will be investigated in the context of the European project Primelife. Recent interest in moving towards data-oriented architectures [25] and other work in data centric security management [26] may influence future work.…”
Section: Resultsmentioning
confidence: 99%
“…These issues will be investigated in the context of the European project Primelife. Recent interest in moving towards data-oriented architectures [25] and other work in data centric security management [26] may influence future work.…”
Section: Resultsmentioning
confidence: 99%
“…Different levels of security needs are usually expressed on process data objects ( [16], [17]). As business processes are mainly task-centric (typically a task represents a web service call), we need to relate these data-centric security needs to the tasks of the business process.…”
Section: A Cloud Security Risk Assessment Modelmentioning
confidence: 99%
“…Loss or exposure of data, especially highly sensitive data, can cause a great deal of damage, both tangible and intangible, to the enterprise. Data-centric security has been proposed to provide fine-grained security to important and sensitive data [2]. The concept has gained much enthusiasm among security researchers and practitioners alike, but it has not fully materialized into a practical security system, mostly because enterprises do not have a clear idea of where their sensitive data resides [3].…”
Section: Introductionmentioning
confidence: 99%