Sciweavers

3149 search results - page 143 / 630
» IT security risk management
Sort
View
COR
2008
116views more  COR 2008»
13 years 9 months ago
Robust multiperiod portfolio management in the presence of transaction costs
We study the viability of different robust optimization approaches to multiperiod portfolio selection. Robust optimization models treat future asset returns as uncertain coefficie...
Dimitris Bertsimas, Dessislava Pachamanova
ESORICS
1994
Springer
14 years 1 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
ACISP
1998
Springer
14 years 1 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
STORAGESS
2006
ACM
14 years 3 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
RAID
1999
Springer
14 years 1 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...