Sciweavers

160 search results - page 15 / 32
» Risk Assessment for Cloud-Based IT Systems
Sort
View
TELSYS
2010
140views more  TELSYS 2010»
14 years 4 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
86
Voted
CSREASAM
2007
14 years 11 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
DSN
2008
IEEE
15 years 4 months ago
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)
This workshop summary gives a brief overview of the workshop on “Resilience Assessment and Dependability Benchmarking” held in conjunction with the 38th IEEE/IFIP Internationa...
Andrea Bondavalli, István Majzik, Aad P. A....
CSE
2009
IEEE
15 years 4 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CIKM
2008
Springer
14 years 11 months ago
Predicting individual disease risk based on medical history
The monumental cost of health care, especially for chronic disease treatment, is quickly becoming unmanageable. This crisis has motivated the drive towards preventative medicine, ...
Darcy A. Davis, Nitesh V. Chawla, Nicholas Blumm, ...