Sciweavers

1422 search results - page 29 / 285
» Information security and risk management
Sort
View
CII
2006
125views more  CII 2006»
13 years 8 months ago
Agent-based model for managing composite product information
The importance of product information management during the whole lifetime of the product has increased due to the technical sophistication of products as well as stricter governm...
Kary Främling, Timo Ala-Risku, Mikko Kär...
FC
2005
Springer
143views Cryptology» more  FC 2005»
14 years 2 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo
IEEEARES
2010
IEEE
14 years 3 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
SIGIR
2002
ACM
13 years 8 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
AMW
2011
13 years 13 days ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis