Sciweavers

164 search results - page 4 / 33
» How to Model Operational Risk If You Must
Sort
View
98
Voted
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 11 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
MOZ
2004
Springer
15 years 5 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
191
Voted
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
83
Voted
ICWE
2007
Springer
15 years 5 months ago
On the Quality of Navigation Models with Content-Modification Operations
Initially, web development methods focused on the generation of read-only web applications for browsing the data stored in relational database systems. Lately, many have evolved to...
Jordi Cabot, Jordi Ceballos, Cristina Gómez
WSC
2008
15 years 1 months ago
Fast simulation of equity-linked life insurance contracts with a surrender option
In this paper, we consider equity-linked life insurance contracts that give their holder the possibility to surrender their policy before maturity. Such contracts can be valued us...
Carole Bernard, Christiane Lemieux