Sciweavers

1422 search results - page 17 / 285
» Information security and risk management
Sort
View
SEC
2008
13 years 10 months ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
CCS
2007
ACM
14 years 3 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
CCS
2008
ACM
13 years 10 months ago
Trust management for secure information flows
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterso...
DSS
2006
104views more  DSS 2006»
13 years 8 months ago
Supply chain information sharing in a macro prediction market
This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain ...
Zhiling Guo, Fang Fang, Andrew B. Whinston
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 2 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany