Sciweavers

164 search results - page 4 / 33
» How to Model Operational Risk If You Must
Sort
View
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 10 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
80
Voted
MOZ
2004
Springer
15 years 3 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
SACMAT
2011
ACM
14 years 28 days ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ICWE
2007
Springer
15 years 4 months ago
On the Quality of Navigation Models with Content-Modification Operations
Initially, web development methods focused on the generation of read-only web applications for browsing the data stored in relational database systems. Lately, many have evolved to...
Jordi Cabot, Jordi Ceballos, Cristina Gómez
WSC
2008
15 years 12 days ago
Fast simulation of equity-linked life insurance contracts with a surrender option
In this paper, we consider equity-linked life insurance contracts that give their holder the possibility to surrender their policy before maturity. Such contracts can be valued us...
Carole Bernard, Christiane Lemieux