Sciweavers

8 search results - page 2 / 2
» Relational Risk Mitigation: The Relationship Approach to Mit...
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
13 years 12 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
SIGSOFT
2008
ACM
13 years 5 months ago
Efficient online monitoring of web-service SLAs
If an organization depends on the service quality provided by another organization it often enters into a bilateral service level agreement (SLA), which mitigates outsourcing risk...
Franco Raimondi, James Skene, Wolfgang Emmerich
ICSE
2005
IEEE-ACM
14 years 5 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu