Sciweavers

3149 search results - page 79 / 630
» IT security risk management
Sort
View
85
Voted
AOSE
2006
Springer
15 years 2 months ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 11 months ago
Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services
: - In the first part of this paper we present the first steps towards providing low-risk and economically feasible network data transfer services. We introduce three types of data...
Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa
73
Voted
PVLDB
2010
104views more  PVLDB 2010»
14 years 9 months ago
MCDB-R: Risk Analysis in the Database
Enterprises often need to assess and manage the risk arising from uncertainty in their data. Such uncertainty is typically modeled as a probability distribution over the uncertain...
Peter J. Haas, Christopher M. Jermaine, Subi Arumu...
80
Voted
MSS
2005
IEEE
79views Hardware» more  MSS 2005»
15 years 4 months ago
Mitigating Risk of Data Loss in Preservation Environments
1 Preservation environments manage digital records for time periods that are much longer than that of a single vendor product. A primary requirement is the preservation of the auth...
Reagan W. Moore, Joseph JáJá, Robert...
ISEM
2008
88views more  ISEM 2008»
14 years 11 months ago
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments
As it lacks central management in Peer-to-Peer (P2P) e-commerce environments, prior to new transactions with an unknown peer, the trust evaluation is critical, which relies on the ...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...