Sciweavers

3193 search results - page 56 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
IIWAS
2007
13 years 9 months ago
Security aspects in Semantic Web Services Filtering
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact cru...
Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, ...
CIARP
2003
Springer
14 years 29 days ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
ITRUST
2005
Springer
14 years 1 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
DEXAW
2007
IEEE
120views Database» more  DEXAW 2007»
14 years 2 months ago
Understanding enterprise integration project risks: A focus group study
The prerequisites of success and reasons for failure for enterprise integration projects are still not wellunderstood as evidenced by large failure rates, including cost or schedu...
Sandeep Purao, Sharoda Paul, Steven Smith