Sciweavers

3149 search results - page 61 / 630
» IT security risk management
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 11 days ago
Situational method engineering for governance, risk and compliance information systems
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
ACSAC
2000
IEEE
14 years 4 days ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
MSR
2006
ACM
14 years 1 months ago
A lightweight approach to technical risk estimation via probabilistic impact analysis
An evolutionary development approach is increasingly commonplace in industry but presents increased difficulties in risk management, for both technical and organizational reasons...
Robert J. Walker, Reid Holmes, Ian Hedgeland, Pune...
JSW
2008
99views more  JSW 2008»
13 years 7 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu
DIM
2007
ACM
13 years 11 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi