Sciweavers

3149 search results - page 77 / 630
» IT security risk management
Sort
View
82
Voted
TR
2011
106views more  TR 2011»
14 years 5 months ago
Exploring Complex Systems Aspects of Blackout Risk and Mitigation
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
94
Voted
CIKM
2008
Springer
15 years 28 days ago
Predicting individual disease risk based on medical history
The monumental cost of health care, especially for chronic disease treatment, is quickly becoming unmanageable. This crisis has motivated the drive towards preventative medicine, ...
Darcy A. Davis, Nitesh V. Chawla, Nicholas Blumm, ...
93
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 5 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
CSREASAM
2006
15 years 10 days ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...
100
Voted
LISA
2003
15 years 9 days ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal