Sciweavers

3149 search results - page 23 / 630
» IT security risk management
Sort
View
CN
2010
94views more  CN 2010»
13 years 7 months ago
A market-based approach to managing the risk of peer-to-peer transactions
Ptrim is a purely decentralised application for performing peer-to-peer transactions. Instead of relying on a typical trust/reputation management approach, Ptrim allows its users t...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...
CCE
2004
13 years 7 months ago
New measures and procedures to manage financial risk with applications to the planning of gas commercialization in Asia
This paper presents some new concepts and procedures for financial risk management. To complement the use of value at risk a new concept, upside potential or opportunity value as ...
Ahmed Aseeri, Miguel J. Bagajewicz
AH
2006
Springer
14 years 1 months ago
Adaptive Patient Education Framework Featuring Personalized Cardiovascular Risk Management Interventions
Abstract. The PULSE project objectives are to generate and evaluate a webbased personalized educational intervention for the management of cardiovascular risk. We present a web-bas...
Selena Davis, Syed Sibte Raza Abidi
JCS
2007
103views more  JCS 2007»
13 years 7 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
ATAL
2004
Springer
14 years 1 months ago
Risk Management Methods for Speculative Actions
In multiagent systems, a cooperative action requires a mutual agreement among multiple agents and the agreement is generally reached by exchanging messages between them, but the d...
Yasuhiko Kitamura, Takuya Murao