Sciweavers

3149 search results - page 58 / 630
» IT security risk management
Sort
View
PDCAT
2005
Springer
14 years 1 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
13 years 7 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
ICCS
2004
Springer
14 years 1 months ago
A Dynamic Stochastic Programming Model for Bond Portfolio Management
In this paper we develop a dynamic stochastic programming model for bond portfolio management. A new risk measurement-shortfall cost is put forward. It allows more tangible express...
Liyong Yu, Shouyang Wang, Yue Wu, Kin Keung Lai
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 2 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer