Sciweavers

669 search results - page 27 / 134
» Managing the Risk of IT Outsourcing
Sort
View
RAID
2004
Springer
15 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 3 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
ANOR
2005
110views more  ANOR 2005»
14 years 9 months ago
Managing Cost Overrun Risk in Project Funding Allocation
This paper discusses decision making of project funding allocation under uncertain project costs. Because project costs are uncertain and funding allocations may not necessarily ma...
Chung-Li Tseng, Kyle Y. Lin, Satheesh K. Sundarara...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
MIDDLEWARE
2007
Springer
15 years 4 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka