Sciweavers

331 search results - page 24 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
123
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 8 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
77
Voted
WSC
1998
15 years 11 days ago
Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
AISM
2004
15 years 13 days ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
IV
2006
IEEE
124views Visualization» more  IV 2006»
15 years 5 months ago
The Making of Trigger and the Agile Engineering of Artist-Scientist Collaboration
The agile process approach used in software engineering was adapted as a foundation for the management of the multimedia art installation project titled "Trigger." By be...
Francis T. Marchese
SEC
2008
15 years 13 days ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux