Sciweavers

331 search results - page 29 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
DBSEC
2006
125views Database» more  DBSEC 2006»
15 years 13 days ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
JUCS
2008
99views more  JUCS 2008»
14 years 11 months ago
A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks
: The reliability of a communications network is often evaluated without taking into account the economic consequence of failures. Here a new approach is proposed to assess the eco...
Maurizio Naldi, Giuseppe D'Acquisto
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 5 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
HASE
2008
IEEE
15 years 3 days ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
WSC
2007
15 years 1 months ago
Clinic: correlated inputs in an automotive paint shop fire risk simulation
General Motors (GM) has developed a first proof-ofconcept simulation model to explore impacts of various fire events in automotive paint shop operations. The approach uses a chron...
Debra A. Elkins, A. Christine LaFleur, Earnest Fos...