Sciweavers

331 search results - page 46 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
CSFW
2010
IEEE
15 years 2 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
ICSE
2000
IEEE-ACM
15 years 2 months ago
A software engineering approach and tool set for developing Internet applications
If a business built a plant to produce products without first designing a process to manufacture them, the risk would be lack of capacity without significant plant redesign. Simil...
David A. Marca, Beth A. Perdue
IFIP13
2004
15 years 13 days ago
The Role of Night Vision Equipment in Military Incidents and Accidents
Night vision devices provide enormous benefits. They enable personnel to carry out operations under conditions that would not otherwise be possible. However, these benefits carry c...
Chris W. Johnson
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 5 months ago
Injury evaluation of human-robot impacts
— Currently, large efforts are unertaken to bring robotic applications to domestic environments. Especially physical human-robot cooperation is a major concern and various design...
Sami Haddadin, Alin Albu-Schäffer, Michael St...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 5 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis