Sciweavers

2237 search results - page 330 / 448
» On the Security of Random Sources
Sort
View
MKWI
2008
168views Business» more  MKWI 2008»
15 years 6 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
IC
2004
15 years 6 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
IC
2001
15 years 6 months ago
The WebShop E-Commerce Framework
- This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web ...
Marcus Fontoura, Wolfgang Pree, Bernhard Rumpe
USS
2004
15 years 6 months ago
Privtrans: Automatically Partitioning Programs for Privilege Separation
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
David Brumley, Dawn Xiaodong Song
AUTOMATICA
2006
183views more  AUTOMATICA 2006»
15 years 5 months ago
Bank management via stochastic optimal control
This paper examines a problem related to the optimal risk management of banks in a stochastic dynamic setting. In particular, we minimize7 market and capital adequacy risk that in...
Janine Mukuddem-Petersen, Mark Adam Petersen