Sciweavers

164 search results - page 7 / 33
» How to Model Operational Risk If You Must
Sort
View
IAT
2010
IEEE
14 years 8 months ago
Selecting Operator Queries Using Expected Myopic Gain
When its human operator cannot continuously supervise (much less teleoperate) an agent, the agent should be able to recognize its limitations and ask for help when it risks making...
Robert Cohn, Michael Maxim, Edmund H. Durfee, Sati...
DBSEC
2000
102views Database» more  DBSEC 2000»
14 years 11 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 3 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
RAID
2004
Springer
15 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
ICEGOV
2007
ACM
15 years 2 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...