Sciweavers

3149 search results - page 174 / 630
» IT security risk management
Sort
View
CORR
2006
Springer
99views Education» more  CORR 2006»
13 years 9 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 3 months ago
Does Interpersonal Trust Also Matter? Exploring the Role of Trust in Successful IT Outsourcing
Recently, the focus of IT outsourcing has been shifting from the “what” and “why” issues to “how” companies manage outsourcing process, during which the relationship m...
Qi Cong, Patrick Y. K. Chau
VLDB
2002
ACM
84views Database» more  VLDB 2002»
13 years 9 months ago
Advanced Database Technologies in a Diabetic Healthcare System
With the increased emphasis on healthcare worldwide, the issue of being able to efficiently and effectively manage large amount of patient information in diverse medium becomes cr...
Wynne Hsu, Mong-Li Lee, Beng Chin Ooi, Pranab Kuma...
IEEEARES
2008
IEEE
14 years 3 months ago
Quantitative Assessment of Enterprise Security System
—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 2 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel