Sciweavers

3193 search results - page 15 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ISF
2006
118views more  ISF 2006»
13 years 7 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad
MANSCI
2010
83views more  MANSCI 2010»
13 years 2 months ago
The Behavior of Risk and Market Prices of Risk Over the Nasdaq Bubble Period
We exploit the information in the options market to study the variations of return risk and market prices of different sources of risk during the rise and fall of the Nasdaq marke...
Gurdip Bakshi, Liuren Wu
IWIA
2005
IEEE
14 years 1 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham