Sciweavers

3149 search results - page 59 / 630
» IT security risk management
Sort
View
ISTAR
2008
13 years 9 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
JORS
2010
134views more  JORS 2010»
13 years 2 months ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
SMC
2007
IEEE
14 years 2 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
ISIPTA
2005
IEEE
165views Mathematics» more  ISIPTA 2005»
14 years 1 months ago
Electric Company Portfolio Optimization Under Interval Stochastic Dominance Constraints
This paper addresses the problem of market risk management for a company in the electricity industry. When dealing with corporate volumetric exposure, there is a need for a method...
Daniel Berleant, Mathieu Dancre, Jean-Philippe Arg...
IFIP
2003
Springer
14 years 28 days ago
TAPI: Transactions for Accessing Public Infrastructure
This paper describes TAPI, an offline scheme intended for general Internet-based micropayments. TAPI, which extends and combines concepts from the KeyNote Microchecks and OTPCoins...
Matt Blaze, John Ioannidis, Sotiris Ioannidis, Ang...