Sciweavers

1422 search results - page 40 / 285
» Information security and risk management
Sort
View
ICSE
2003
IEEE-ACM
14 years 2 months ago
Tool Support for Scenario-Based Architecture Evaluation
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Steffen Thiel, Andreas Hein, Heiner Engelhardt
WSC
1998
13 years 10 months ago
Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
ESORICS
1994
Springer
14 years 11 days ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
PET
2010
Springer
14 years 24 days ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
ACSAC
1998
IEEE
14 years 1 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu