Sciweavers

3149 search results - page 24 / 630
» IT security risk management
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
JDS
2007
104views more  JDS 2007»
13 years 7 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
WSC
2004
13 years 9 months ago
Portfolio Credit Risk Analysis Involving CDO Tranches
Credit risk analysis for portfolios containing CDO tranches is a challenging task for risk managers. We propose here a basis function approach for CDO tranche valuation and portfo...
Menghui Cao, William J. Morokoff
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 7 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
DANCE
2002
IEEE
14 years 18 days ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...