Sciweavers

180 search results - page 4 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
ICICS
2009
Springer
14 years 1 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
RE
2001
Springer
13 years 11 months ago
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model
Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongo...
Ryan A. Carter, Annie I. Antón, Laurie A. W...
BPM
2008
Springer
164views Business» more  BPM 2008»
13 years 8 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
IPPS
2007
IEEE
14 years 1 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya
IAT
2010
IEEE
13 years 4 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski