Sciweavers

2588 search results - page 45 / 518
» Project risk management
Sort
View
SACMAT
2003
ACM
15 years 10 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
PRDC
2006
IEEE
15 years 11 months ago
Ontology based IT-security planning
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
Stefan Fenz, Edgar Weippl
IUSED
2008
15 years 6 months ago
Reducing Risk through Human Centred Design
The National Academy of Science's report on Human-System Integration in the system development process (NAS HSI report) [12] explains how human needs can be integrated into s...
Nigel Bevan
VOTEID
2007
Springer
15 years 11 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
EMISA
2004
Springer
15 years 10 months ago
Towards an integration of the cooperative design context in collaborative tools
: In a design project, the actors cooperate to achieve a same objective, which can be the production of a document, a manufactured product, a plane or a building. The role of a coo...
Gilles Halin, Damien Hanser, Sylvain Kubicki