Sciweavers

1183 search results - page 31 / 237
» Risk Management with Benchmarking
Sort
View
EKNOW
2010
14 years 6 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
SIGMOD
2011
ACM
297views Database» more  SIGMOD 2011»
14 years 2 months ago
Apples and oranges: a comparison of RDF benchmarks and real RDF datasets
The widespread adoption of the Resource Description Framework (RDF) for the representation of both open web and enterprise data is the driving force behind the increasing research...
Songyun Duan, Anastasios Kementsietsidis, Kavitha ...
ICSE
2003
IEEE-ACM
15 years 5 months ago
Requirements, Architectures and Risks
There is wide agreement that architecture plays a prominent role in large, complex software systems. Selection of an appropriate architecture – one that matches the system requi...
James D. Kiper, Martin S. Feather
SACMAT
2003
ACM
15 years 5 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
PRDC
2006
IEEE
15 years 5 months ago
Ontology based IT-security planning
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
Stefan Fenz, Edgar Weippl