Sciweavers

3149 search results - page 75 / 630
» IT security risk management
Sort
View
FS
2006
66views more  FS 2006»
13 years 9 months ago
Generalized deviations in risk analysis
General deviation measures are introduced and studied systematically for their potential applications to risk management in areas like portfolio optimization and engineering. Such...
R. Tyrrell Rockafellar, Stan Uryasev, Michael Zaba...
ACSAC
1998
IEEE
14 years 1 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
CN
2000
72views more  CN 2000»
13 years 8 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
TITS
2011
150views more  TITS 2011»
13 years 3 months ago
Online Spatio-Temporal Risk Assessment for Intelligent Transportation Systems
—Due to modern pervasive wireless technologies and high-performance monitoring systems, spatio-temporal information plays an important role in areas such as intelligent transport...
Ondrej Linda, Milos Manic
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi