Sciweavers

669 search results - page 43 / 134
» Managing the Risk of IT Outsourcing
Sort
View
EKNOW
2010
14 years 4 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
ICSE
2003
IEEE-ACM
15 years 3 months ago
Requirements, Architectures and Risks
There is wide agreement that architecture plays a prominent role in large, complex software systems. Selection of an appropriate architecture – one that matches the system requi...
James D. Kiper, Martin S. Feather
SACMAT
2003
ACM
15 years 3 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
PRDC
2006
IEEE
15 years 3 months ago
Ontology based IT-security planning
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
Stefan Fenz, Edgar Weippl
ATAL
2009
Springer
15 years 4 months ago
Generalization risk minimization in empirical game models
Experimental analysis of agent strategies in multiagent systems presents a tradeoff between granularity and statistical confidence. Collecting a large amount of data about each s...
Patrick R. Jordan, Michael P. Wellman