Sciweavers

3149 search results - page 67 / 630
» IT security risk management
Sort
View
CCS
2007
ACM
14 years 3 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 3 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
IAT
2010
IEEE
13 years 7 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
DSS
2006
104views more  DSS 2006»
13 years 9 months ago
Supply chain information sharing in a macro prediction market
This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain ...
Zhiling Guo, Fang Fang, Andrew B. Whinston
IPPS
2005
IEEE
14 years 2 months ago
Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling
In this paper, our contributions are two-fold: First, we enhance the Min-Min and Sufferage heuristics under three risk modes driven by security concerns. Second, we propose a new ...
Shanshan Song, Yu-Kwong Kwok, Kai Hwang