Sciweavers

3193 search results - page 46 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
JITECH
2007
220views more  JITECH 2007»
13 years 7 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
SOUPS
2009
ACM
14 years 2 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 2 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
ASC
2007
14 years 6 months ago
A BDI Agent System for Credit Risk Assessment based on Fuzzy Logic
Credit risk has always been an important issue for banks and other financial intermediaries. A reliable and consistent computing system is necessary to simplify the decision mak...
S. Bonura, V. Morreale, G. Cammarata, F. Cantore,...
EUROSPI
2005
Springer
14 years 1 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane