Sciweavers

3193 search results - page 35 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
SIN
2010
ACM
13 years 5 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
IJAR
2007
86views more  IJAR 2007»
13 years 7 months ago
Joint propagation of probability and possibility in risk analysis: Towards a formal framework
This paper discusses some aspects of fuzzy random variables obtained by propagating uncertainty in risk analysis when some input parameters are stochastic, while others are determ...
Cédric Baudrit, Inés Couso, Didier D...
IEEEARES
2006
IEEE
14 years 1 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai
BIBM
2007
IEEE
159views Bioinformatics» more  BIBM 2007»
14 years 2 months ago
Predicting Future High-Cost Patients: A Real-World Risk Modeling Application
Health care data from patients in the Arizona Health Care Cost Containment System, Arizona’s Medicaid program, provides a unique opportunity to exploit state-of-the-art data pro...
Sai T. Moturu, William G. Johnson, Huan Liu
DSRT
2008
IEEE
14 years 2 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli