Sciweavers

3149 search results - page 206 / 630
» IT security risk management
Sort
View
ICDIM
2008
IEEE
14 years 4 months ago
Towards e-Government: The security SOA approach of the University of Murcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university c...
Daniel Sánchez-Martínez, C. Inmacula...
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 9 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
OSDI
2002
ACM
14 years 10 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin
ICECCS
2000
IEEE
126views Hardware» more  ICECCS 2000»
14 years 2 months ago
Domain Modeling of Software Process Models
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process...
Hassan Gomaa, Larry Kerschberg, Ghulam A. Farrukh
AUTOMATICA
2006
101views more  AUTOMATICA 2006»
13 years 9 months ago
A risk-sensitive approach to total productive maintenance
While risk-sensitive (RS) approaches for designing plans of total productive maintenance are critical in manufacturing systems, there is little in the literature by way of theoret...
Abhijit Gosavi