Sciweavers

3193 search results - page 21 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
114
Voted
IEEEARES
2008
IEEE
15 years 8 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
119
Voted
CSFW
2010
IEEE
15 years 5 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
WSC
2008
15 years 4 months ago
Supply chain risks analysis by using jump-diffusion model
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
Xianzhe Chen, Jun Zhang
SAC
2011
ACM
14 years 4 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
DIM
2009
ACM
15 years 6 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad