Sciweavers

3149 search results - page 28 / 630
» IT security risk management
Sort
View
SSDBM
2002
IEEE
100views Database» more  SSDBM 2002»
14 years 16 days ago
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
Josep Domingo-Ferrer, Anna Oganian, Vicenç ...
FC
2001
Springer
91views Cryptology» more  FC 2001»
14 years 4 days ago
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
This article addresses a problem with copy-protecting a large collection of electronic content. The notion and severity of a generic attack are raised in the context of Adams and Z...
Tadayoshi Kohno, Mark McGovern
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
KES
2007
Springer
14 years 1 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...