Sciweavers

3149 search results - page 79 / 630
» IT security risk management
Sort
View
AOSE
2006
Springer
14 years 21 days ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 9 months ago
Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services
: - In the first part of this paper we present the first steps towards providing low-risk and economically feasible network data transfer services. We introduce three types of data...
Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa
PVLDB
2010
104views more  PVLDB 2010»
13 years 7 months ago
MCDB-R: Risk Analysis in the Database
Enterprises often need to assess and manage the risk arising from uncertainty in their data. Such uncertainty is typically modeled as a probability distribution over the uncertain...
Peter J. Haas, Christopher M. Jermaine, Subi Arumu...
MSS
2005
IEEE
79views Hardware» more  MSS 2005»
14 years 2 months ago
Mitigating Risk of Data Loss in Preservation Environments
1 Preservation environments manage digital records for time periods that are much longer than that of a single vendor product. A primary requirement is the preservation of the auth...
Reagan W. Moore, Joseph JáJá, Robert...
ISEM
2008
88views more  ISEM 2008»
13 years 9 months ago
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments
As it lacks central management in Peer-to-Peer (P2P) e-commerce environments, prior to new transactions with an unknown peer, the trust evaluation is critical, which relies on the ...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...