Sciweavers

69 search results - page 8 / 14
» A Fuzzy Model for IT Security Investments
Sort
View
70
Voted
ICCSA
2010
Springer
14 years 8 months ago
Emergent Stock Market Behaviour from a Multitude of Simple Agents
In our work the focus is on emergent behaviour in large groups of stock market participants. We do not assume that market participants take rational investment decisions based on f...
Volker Nissen, Danilo Saft
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
WSC
2004
14 years 11 months ago
Simulation-Based Pricing of Mortgage-Backed Securities
Mortgage-Backed-Securities (MBS), as the largest investment class of fixed income securities, have always been hard to price. Because of the following reasons, normal numerical me...
Jian Chen
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
15 years 3 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
IEEEARES
2008
IEEE
15 years 4 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul