Sciweavers

212 search results - page 7 / 43
» Risk Assessment and Integrity in System Design
Sort
View
ENVSOFT
2007
122views more  ENVSOFT 2007»
14 years 9 months ago
Fuzzy expert systems and GIS for cholera health risk prediction in southern Africa
Cholera (Vibrio cholerae) is endemic in southern Africa and frequently breaks out in epidemics along the eastern seaboard. Extensive resources are directed at combating cholera ye...
Gavin Fleming, Marna van der Merwe, Graeme McFerre...
EUROMICRO
2007
IEEE
15 years 3 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
ECIS
2003
14 years 11 months ago
Offshore information systems outsourcing: strategies and scenarios
This paper presents the findings of an ongoing research study into offshore information technology and systems outsourcing. Fieldwork was conducted in India and the United Kingdom...
Naureen Khan, Wendy Currie, Vishanth Weerakkody
DBSEC
2006
125views Database» more  DBSEC 2006»
14 years 11 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
86
Voted
CSREASAM
2007
14 years 11 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...