Sciweavers

331 search results - page 11 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
EUSFLAT
2003
110views Fuzzy Logic» more  EUSFLAT 2003»
15 years 10 days ago
Fuzzy-neuro risk assessment of distributed real-time systems through formal and object-oriented systems modelling
The purpose of this paper is to advocate and encourage the application of fuzzy-neuro algorithms in the risk assessment of Distributed Real-Time (DRT) systems, where object-orient...
Atoosa P.-J. Thunem
SIN
2010
ACM
14 years 8 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
IJSEKE
2011
141views more  IJSEKE 2011»
14 years 2 months ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
CRIWG
2008
15 years 12 days ago
Risk Assessment in Healthcare Collaborative Settings: A Case Study Using SHELL
This paper describes a case study addressing risk assessment in a hospital unit. The objective was to analyse the impact on collaborative work after the unit changed their installa...
Pedro Antunes, Rogerio Bandeira, Luís Carri...
ECUMN
2007
Springer
15 years 5 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...