Sciweavers

5722 search results - page 543 / 1145
» Security Function Interactions
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
15 years 7 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
WICSA
2004
15 years 6 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
AAECC
2006
Springer
109views Algorithms» more  AAECC 2006»
15 years 5 months ago
Cryptosystems using Linear Groups
Several suggestions are presented for developing cryptosystems, both classical and public key, using a combination of combinatorial group theory and linear groups. In particular, t...
Gilbert Baumslag, Benjamin Fine, Xiaowei Xu
CORR
2006
Springer
111views Education» more  CORR 2006»
15 years 5 months ago
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of ...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
EOR
2006
97views more  EOR 2006»
15 years 5 months ago
Bayesian portfolio selection with multi-variate random variance models
We consider multi-period portfolio selection problems for a decision maker with a specified utility function when the variance of security returns is described by a discrete time ...
Refik Soyer, Kadir Tanyeri