Academic literature on the topic 'Security compliance models'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security compliance models.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security compliance models"
Al-Hamdani, Wasim A. "Three Models to Measure Information Security Compliance." International Journal of Information Security and Privacy 3, no. 4 (2009): 43–67. http://dx.doi.org/10.4018/jisp.2009100104.
Full textRajashekar, Reddy Yasani, and Venkatesh Ratnam Karthik. "Automating Cloud Security and Compliance at Scale Strategies and Best Practices." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 77–82. https://doi.org/10.5281/zenodo.13912688.
Full textOkunlola, Oluwafemi Alabi, Jelil Olaoye, Okunlola Olalekan Samuel, Adeola Oluwaseyi Okunlola, and Opeyemi Alao. "Zero Trust Security Models in Cloud Environments: Compliance Implications." International Journal of Future Engineering Innovations 2, no. 2 (2025): 96–102. https://doi.org/10.54660/ijfei.2025.2.2.96-102.
Full textTsohou, Aggeliki, and Philipp Holtkamp. "Are users competent to comply with information security policies? An analysis of professional competence models." Information Technology & People 31, no. 5 (2018): 1047–68. http://dx.doi.org/10.1108/itp-02-2017-0052.
Full textKamau, Eunice, Teemu Myllynen, Anuoluwapo Collins, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Advances in Full-Stack Development Frameworks: A Comprehensive Review of Security and Compliance Models." International Journal of Multidisciplinary Research and Growth Evaluation 5, no. 1 (2024): 1172–85. https://doi.org/10.54660/.ijmrge.2024.5.1.1172-1185.
Full textKamau, Eunice, Teemu Myllynen, Anuoluwapo Collins, Gideon Opeyemi Babatunde, and Abidemi Adeleye Alabi. "Advances in Full-Stack Development Frameworks: A Comprehensive Review of Security and Compliance Models." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 1 (2023): 639–52. https://doi.org/10.54660/.ijmrge.2023.4.1.639-652.
Full textSunday Adeola Oladosu, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Adeoye Idowu Afolabi, Adebimpe Bolatito Ige, and Olukunle Oladipupo Amoo. "Advancing cloud networking security models: Conceptualizing a unified framework for hybrid cloud and on-premise integrations." Magna Scientia Advanced Research and Reviews 3, no. 1 (2021): 079–90. https://doi.org/10.30574/msarr.2021.3.1.0076.
Full textDachepally, Raju. "Event-Driven Security: Automating Compliance and Threat Detection in Cloud Environments." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 604–6. https://doi.org/10.54660/.ijmrge.2022.3.5.604-606.
Full textD., Kavitha, and Ravikumar S. "Software Security Requirement Engineering for Risk and Compliance Management." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (2021): 11–17. http://dx.doi.org/10.35940/ijitee.e8628.0210421.
Full textKavitha, D., and S. Ravikumar. "Software Security Requirement Engineering for Risk and Compliance Management." International Journal of Innovative Technology and Exploring Engineering 10, no. 5 (2021): 11–17. http://dx.doi.org/10.35940/ijitee.e8628.0310521.
Full textDissertations / Theses on the topic "Security compliance models"
Chung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.
Full textSaleh, Mohamed S. M. "Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textSaleh, Mohamed Saad Morsy. "Analysis of information security risks and protection management requirements for enterprise networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5414.
Full textAlotaibi, Mutlaq. "A model for monitoring end-user security policy compliance." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/10237.
Full textMaphakela, Madidimalo Rabbie. "A model for legal compliance in the South African banking sector : an information security perspective." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.
Full textBitra, Pranavi, and Chandra Srilekha Achanta. "Development and Evaluation of an Artefact Model to Support Security Compliance for DevSecOps." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21106.
Full textTuyikeze, Tite. "A model for information security management and regulatory compliance in the South African health sector." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/425.
Full textDala, Prittish. "A framework and model of operation for electronic personal information to achieve and maintain compliance with Condition 7 of the Protection of Personal Information (POPI) Act." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/61578.
Full textCheng, Sin Ying. "Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.
Full textKobayashi, Tiago Hiroshi. "Uma ferramenta de manipula??o de pacotes para an?lise de protocolos de redes industriais baseados em TCP/IP." Universidade Federal do Rio Grande do Norte, 2009. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15292.
Full textBooks on the topic "Security compliance models"
Peldszus, Sven Matthias. Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37665-9.
Full textShitov, Viktor. Information content management. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.
Full textPeldszus, Sven Matthias. Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden GmbH, 2022.
Find full textBuffon, Marciano, and Ivan Luiz Steffens. Tributação e constituição: Por um modo de tributar hermeneuticamente adequado à principiologia constitucional brasileira. Brazil Publishing, 2020. http://dx.doi.org/10.31012/978-65-5861-066-3.
Full textMedeiros, Mauricio, Beatriz Fialho, Priscila Soares, and Daniel Lacerda, eds. A primeira vacina 100% brasileira contra a Covid-19: a conquista de Bio-Manguinhos/Fiocruz. Fundação Oswaldo Cruz / Bio-Manguinhos, 2022. http://dx.doi.org/10.35259/vacinacovid.2022_52830.
Full textBook chapters on the topic "Security compliance models"
Peldszus, Sven. "Security Compliance in Model-Driven Software Development." In Ernst Denert Award for Software Engineering 2022. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44412-8_4.
Full textSpies, Marcus. "Rule-Enhanced Domain Models for Cloud Security Governance, Risk and Compliance Management." In Rule-Based Modeling and Computing on the Semantic Web. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24908-2_2.
Full textOlatunji, Sunday O., Abdulrahman S. Almuhaidib, Abdulaziz S. Alhuwaishil, et al. "Automating Compliance Evidence Extraction with Machine Learning." In Proceedings in Technology Transfer. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-8588-9_3.
Full textOlivero, Sergio. "Implementation of Environmental Systems in Compliance with ISO 14001 Standard in the Context of SMEs in Northwestern Italy." In Deposit and Geoenvironmental Models for Resource Exploitation and Environmental Security. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0303-2_13.
Full textPeldszus, Sven Matthias. "Static Security Compliance Checks." In Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37665-9_8.
Full textvon Solms, S. H., and R. von Solms. "The Control Part of the Model – An Information Security Compliance Management Environment." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_7.
Full textAl-Hamdani, Wasim A. "Three Models to Measure Information Security Compliance." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch022.
Full textVankayalapati, Ravi Kumar. "Security and compliance in hybrid cloud models." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-81-984306-5-6_8.
Full textMhia-Alddin, Dilshad Ahmad, and Akram Mahmoud Hussein. "AI-Powered Contract Security." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-3296-3.ch002.
Full textKoukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, and Iakovos S. Venieris. "Privacy Compliance Requirements in Workflow Environments." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.
Full textConference papers on the topic "Security compliance models"
Weng, Yijie, Xuechun Yang, Xiaorui Zhang, Yihong Jin, Fu Lei, and Tianle Zhang. "SafeGen-X: A Comprehensive Framework for Enhancing Security, Compliance, and Robustness in Large Language Models." In 2025 8th International Conference on Advanced Algorithms and Control Engineering (ICAACE). IEEE, 2025. https://doi.org/10.1109/icaace65325.2025.11019350.
Full textZahra, Aliya Fakhira, and Rio Guntur Utomo. "Factors Influencing Student Compliance With University Information Security Policies in Indonesia Using the Unified Model Information Security Policy Compliance (UM-ISPC)." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929144.
Full textAlexander, Michael, and Candiwan Candiwan. "A Conceptual Model of Information Security Compliance and Protection Behavior through Stimulus-Organism-Response Theory." In 2024 IEEE International Conference on Computing (ICOCO). IEEE, 2024. https://doi.org/10.1109/icoco62848.2024.10928261.
Full textZahid, Maryam, Alessio Bucaioni, and Francesco Flammini. "On the ISO Compliance of Model-Based Risk Assessment for Autonomous Cyber-Physical Production Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679385.
Full textRouland, Quentin, Stojanche Gjorcheski, and Jason Jaskolka. "A Security Compliance-by-Design Framework Utilizing Reusable Formal Models." In 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2023. http://dx.doi.org/10.1109/qrs-c60940.2023.00054.
Full textAnass, Rabii, Assoul Saliha, and Roudiès Ounsa. "A Concept & Compliance Study of Security Maturity Models with ISO 21827." In 22nd International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009569703850392.
Full textGuarda, Paolo, Silvio Ranise, and Hari Siswantoro. "Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. ACM, 2017. http://dx.doi.org/10.1145/3078861.3078879.
Full textSaraiva, Juliana, Cleidson de Souza, and Sérgio Soares. "MMAI-LGPD: A Maturity Model for Governance and Data Compliance in Information Systems Institutions." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.246644.
Full textMairaj ud din, Qazi, and Qadeer Ahmed. "Automated TARA Framework for Cybersecurity Compliance of Heavy Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2809.
Full textJungbauer, Christoph, and Christian Luidold. "Certificates and the security of digital health information." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005932.
Full textReports on the topic "Security compliance models"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textPasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.
Full textHoward, Heidi, Chad Helmle, Raina Dwivedi, and Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/39480.
Full textRyan, Matthew, Neerupma Bhardwaj, Miguel Camara, et al. Securing the future of microbiome research and innovation: the need for biobanking infrastructure in the UK. CABI, 2024. http://dx.doi.org/10.1079/20240382445.
Full textOrr, Kyla, Ali McKnight, Kathryn Logan, and Hannah Ladd-Jones. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package 7 final report engagement with inshore fisheries to promote and inform. Edited by Mark James. Marine Alliance for Science and Technology for Scotland (MASTS), 2020. http://dx.doi.org/10.15664/10023.23453.
Full textRagozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.
Full textDemuynck, Méryl, Anna-Maria Andreeva, and George Kefford. A Practitioner’s Guide to Working with Children in VE-Affiliated Families: Protecting the Rights of the Child. ICCT, 2023. http://dx.doi.org/10.19165/2022.3.03.
Full textFinancial Stability Report - Second Semester of 2021. Banco de la República, 2022. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2021.
Full text