Sciweavers

669 search results - page 98 / 134
» Managing the Risk of IT Outsourcing
Sort
View
EUROSPI
2005
Springer
15 years 3 months ago
Goal-Driven Requirements Engineering for Supporting the ISO 15504 Assessment Process
It is advocated to use the ISO/IEC 15504 standard into new domains not related to Information Technology (IT), giving a powerful enterprise-wide assessment tool for quality manager...
André Rifaut
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
15 years 10 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
POLICY
2009
Springer
15 years 4 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
VTC
2008
IEEE
15 years 4 months ago
Optimizing Adaptive Transmission Policies for Wireless Vehicular Communications
—The adoption of wireless vehicular communication technologies would strongly depend on the technologies transmission reliability, required by QoS demanding traffic safety applic...
Miguel Sepulcre, Javier Gozálvez
IEEEARES
2007
IEEE
15 years 4 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath