Sciweavers

3149 search results - page 89 / 630
» IT security risk management
Sort
View
ITRUST
2005
Springer
14 years 2 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao
ICIS
2000
13 years 10 months ago
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas
ICSE
1999
IEEE-ACM
14 years 1 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
IJAR
2008
116views more  IJAR 2008»
13 years 9 months ago
Portfolio management under epistemic uncertainty using stochastic dominance and information-gap theory
Portfolio management in finance is more than a mathematical problem of optimizing performance under risk constraints. A critical factor in practical portfolio problems is severe u...
Daniel Berleant, L. Andrieu, Jean-Philippe Argaud,...
ECSA
2010
Springer
13 years 9 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...