Sciweavers

3193 search results - page 29 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
AISM
2004
13 years 9 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
EGOV
2007
Springer
14 years 1 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
JCP
2008
104views more  JCP 2008»
13 years 7 months ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang
HICSS
2005
IEEE
135views Biometrics» more  HICSS 2005»
14 years 1 months ago
On Space Exploration And Human Error - A Paper on Reliability and Safety
NASA space exploration should largely address a problem class in reliability and risk management stemming primarily from human error, system risk and multi-objective trade-off ana...
David A. Maluf, Yuri Gawdiak, David G. Bell
SECURWARE
2008
IEEE
14 years 2 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...