Sciweavers

1183 search results - page 134 / 237
» Risk Management with Benchmarking
Sort
View
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 10 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
SEAFOOD
2007
Springer
15 years 10 months ago
An Evaluation Method for Offshore Software Development by Structural Equation Modeling
Abstract. To determine the magnitude of risk factors in offshore software development, we explain how structural equation modeling works for questionnaire samples. Each response to...
Yoshihisa Wada, Daiki Nakahigashi, Hiroshi Tsuji
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
15 years 10 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
SWS
2006
ACM
15 years 10 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch