Sciweavers

669 search results - page 11 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 2 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
APSEC
2008
IEEE
13 years 9 months ago
Risks and Risk Management in Software Architecture Evolution: An Industrial Survey
The effort that has been made to study risk management in the context of software architecture and its evolution, has so far focused on output from structured evaluations. However...
Odd Petter N. Slyngstad, Reidar Conradi, Muhammad ...
CCS
2010
ACM
13 years 11 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
COMPSEC
2004
115views more  COMPSEC 2004»
13 years 7 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart