Sciweavers

331 search results - page 51 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
BIRTHDAY
2012
Springer
13 years 6 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
ICSE
2012
IEEE-ACM
13 years 1 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
71
Voted
ECIS
2004
15 years 12 days ago
Value-based business modelling for network organizations: lessons learned from the electricity sector
Speed and availability of information, delivered in past years by Internet technologies, made it easier for any company to outsource primary activities, which resulted in unbundli...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
SRDS
2007
IEEE
15 years 5 months ago
Using Hidden Semi-Markov Models for Effective Online Failure Prediction
A proactive handling of faults requires that the risk of upcoming failures is continuously assessed. One of the promising approaches is online failure prediction, which means that...
Felix Salfner, Miroslaw Malek
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes