Sciweavers

669 search results - page 119 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ERLANG
2008
ACM
13 years 10 months ago
Testing Erlang data types with quviq quickcheck
When creating software, data types are the basic bricks. Most of the time a programmer will use data types defined in library modules, therefore being tested by many users over ma...
Thomas Arts, Laura M. Castro, John Hughes
CRITIS
2007
13 years 10 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
FOIS
2008
13 years 10 months ago
Introducing Realist Ontology for the Representation of Adverse Events
The goal of the REMINE project is to build a high performance prediction, detection and monitoring platform for managing Risks against Patient Safety (RAPS). Part of the work invol...
Werner Ceusters, Maria Capolupo, Georges De Moor, ...
ISTAR
2008
13 years 10 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
SIS
2008
13 years 10 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...