Sciweavers

575 search results - page 26 / 115
» A model for evaluating IT security investments
Sort
View
EATIS
2007
ACM
15 years 5 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 8 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ASIASIM
2004
Springer
15 years 7 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
COMPSAC
2006
IEEE
15 years 8 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
105
Voted
AAAI
2008
15 years 4 months ago
Reasoning about the Appropriateness of Proponents for Arguments
Formal approaches to modelling argumentation provide ways to present arguments and counterarguments, and to evaluate which arguments are, in a formal sense, warranted. While these...
Anthony Hunter