Search For:

Displaying 1-7 out of 7 total
An Enterprise Ontology-Based Database for Continuous Monitoring Application
Found in: 2013 IEEE 15th Conference on Business Informatics (CBI)
By Rui Pedro Marques,Henrique Santos,Carlos Santos
Issue Date:July 2013
pp. 7-12
Sometimes information systems fail or have operational and communication problems because designers may not have knowledge of the domain which is intended to be modeled. The same happens with systems for monitoring. Thus, an ontological model is needed to ...
 
Continuous Assurance on Organizational Transactions
Found in: Computer and Information Science, ACIS International Conference on
By Rui Pedro Marques,Henrique Santos,Carlos Santos
Issue Date:June 2012
pp. 363-369
Nowadays there is a new awareness of the importance of continuous monitoring and controlling of organizational transactions, because their auditing in real time allows to determine the degree of reliability with which transactions are carried out, mitigati...
 
Keystroke Dynamics for Continuous Access Control Enforcement
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Joao Ferreira,Henrique Santos
Issue Date:October 2012
pp. 216-223
The weak connection between human users and their digital identities is often the target vulnerability explored by attacks to information systems. Currently, authentication mechanisms are the only barrier to prevent those attacks. Traditional password-base...
 
Open Government and Citizen Participation in Law Enforcement via Crowd Mapping
Found in: IEEE Intelligent Systems
By Vasco Furtado,Carlos Caminha,Leonardo Ayres,Henrique Santos
Issue Date:July 2012
pp. 63-69
The authors describe WikiCrimes, a project founded on a website of the same name that aims to offer a common interaction space for the general public where they can note criminal activity and track the lo-cations where such crimes occur. The goal is to enc...
 
A Security Framework for Audit and Manage Information System Security
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Teresa Susana Mendes Pereira, Henrique Santos
Issue Date:September 2010
pp. 29-32
Auditing Information Systems Security is difficult and becomes crucial to ensure the daily operational activities of organizations as well as to promote competition and to create new business opportunities. A conceptual security framework to manage and aud...
 
Health users' perception of biometric authentication technologies
Found in: 2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)
By Paulo Rodrigues,Henrique Santos
Issue Date:June 2013
pp. 320-325
Biometric technologies already play a major role in security systems contexts and are generally considered for identification and authentication. Some techniques are used in several services not only to ensure physical access to facilities but also to prov...
   
Botnets: a heuristic-based detection framework
Found in: Proceedings of the Fifth International Conference on Security of Information and Networks (SIN '12)
By Henrique Santos, Luís Mendonça
Issue Date:October 2012
pp. 33-40
Many different approaches have been used to target Internet security throughout time. It is now easy to realize the attackers' motivational shifts from the early days of lonely, proud-based, virus development to the recent eras of cooperative Internet cybe...
     
 1