Research in enterprise system security has largely focused on the development of theoretical models capable of demonstrating mathematically that they possess desired security properties. However, recent results confirm that many of these models cannot be applied in practice because of the unpredictability of human participants' behavior in business processes. Moreover, while malicious attacks remain a significant problem, the majority of user-caused information leaks in Enterprise Systems are unintentional (or have many unintentional components) and could potentially be prohibited if explicitly recognized and appropriately modeled. In this paper we argue that approaches for achieving information flow security in enterprises need to combine ...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance...