Sciweavers

331 search results - page 8 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
IFIP12
2008
15 years 12 days ago
A Risk Assessment System with Automatic Extraction of Event Types
In this article we describe the joint effort of experts in linguistics, information extraction and risk assessment to integrate EventSpotter, an automatic event extraction engine, ...
Philippe Capet, Thomas Delavallade, Takuya Nakamur...
IFIP12
2008
15 years 12 days ago
Addressing Risk Assessment for Patient Safety in Hospitals through Information Extraction in Medical Reports
: Hospital Acquired Infections (HAI) is a real burden for doctors and risk surveillance experts. The impact on patients' health and related healthcare cost is very significant...
Denys Proux, Frédérique Segond, Solw...
TII
2011
206views Education» more  TII 2011»
14 years 5 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
ESORICS
2007
Springer
15 years 5 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 5 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...