Sciweavers

6147 search results - page 39 / 1230
» Requirements, Architectures and Risks
Sort
View
LSO
2004
Springer
15 years 5 months ago
Learning How to Manage Risks Using Organizational Knowledge
In spite of being an important software activity, many software organizations present difficulties in managing risks. This happens mainly due to their low maturity level, and becau...
Ricardo de Almeida Falbo, Fabiano Borges Ruy, Glei...
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 6 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
CIKM
2008
Springer
15 years 1 months ago
Predicting individual disease risk based on medical history
The monumental cost of health care, especially for chronic disease treatment, is quickly becoming unmanageable. This crisis has motivated the drive towards preventative medicine, ...
Darcy A. Davis, Nitesh V. Chawla, Nicholas Blumm, ...
FC
1999
Springer
102views Cryptology» more  FC 1999»
15 years 4 months ago
Risk Management for E-Cash Systems with Partial Real-Time Audit
We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in ...
Yacov Yacobi
CCS
2009
ACM
16 years 13 days ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart