Sciweavers

3149 search results - page 212 / 630
» IT security risk management
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
STORAGESS
2006
ACM
14 years 3 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
XPU
2007
Springer
14 years 3 months ago
A Case Study of the Implementation of Agile Methods in a Bioinformatics Project
From July 2005 to August 2006, a bioinformatics project experienced a substantial transformation by adopting Scrum and some XP practices. The paper reveals project risks, previous ...
Xueling Shu, Andrei L. Turinsky, Christoph W. Sens...
NSDI
2008
13 years 12 months ago
Understanding Privacy Settings in Facebook with an Audience View
Users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Our ongoing research investigates mec...
Heather Richter Lipford, Andrew Besmer, Jason Wats...
WSC
2008
13 years 12 months ago
Valuation of variable annuity contracts with cliquet options in Asia markets
Variable annuities are very appealing to the investor. For example, in United States, sales volume on variable annuities grew to a record 184 billion in calendar year 2006. Howeve...
Ming-hua Hsieh