Sciweavers

331 search results - page 4 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
EDOC
2002
IEEE
15 years 3 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
CAISE
2007
Springer
15 years 5 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
108
Voted
ASIAMS
2008
IEEE
15 years 5 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
91
Voted
CSSE
2008
IEEE
15 years 5 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
84
Voted
COR
2004
72views more  COR 2004»
14 years 10 months ago
A subjective assessment of alternative mission architectures for the human exploration of Mars at NASA using multicriteria decis
The primary driver for developing missions to send humans to other planets is to generate signi
Madjid Tavana