Sciweavers

3149 search results - page 53 / 630
» IT security risk management
Sort
View
DBSEC
2010
123views Database» more  DBSEC 2010»
13 years 8 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ECIS
2003
13 years 9 months ago
ICT corporate infrastructures and risk: a dual perspective
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
Claudio U. Ciborra, Daniel Osei-joehene
SIGIR
2002
ACM
13 years 7 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
FC
2009
Springer
134views Cryptology» more  FC 2009»
14 years 2 months ago
Cryptographic Combinatorial Securities Exchanges
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
Christopher Thorpe, David C. Parkes
WORDS
2005
IEEE
14 years 1 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...