Sciweavers

669 search results - page 24 / 134
» Managing the Risk of IT Outsourcing
Sort
View
GIS
2010
ACM
13 years 9 months ago
INTACT: a spatial query integrity assurance framework for location-based services
It is cost-effective for data owners to publicize their spatial databases via database outsourcing; however, data privacy and query integrity are major challenges. In this demonst...
Chih-Jye Wang, Wei-Shinn Ku, Ling Hu, Cyrus Shahab...
EOR
2007
123views more  EOR 2007»
13 years 10 months ago
A stochastic model for risk management in global supply chain networks
With the increasing emphasis on supply chain vulnerabilities, effective mathematical tools for analyzing and understanding appropriate supply chain risk management are now attrac...
Mark Goh, Joseph Y. S. Lim, Fanwen Meng
IEEEHPCS
2010
13 years 9 months ago
Security, trust and risk in Digital Rights Management ecosystem
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation....
Zhiyong Zhang
CNSM
2010
13 years 7 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
IJBIS
2008
99views more  IJBIS 2008»
13 years 11 months ago
Managing legal risks associated with intellectual property on the web
: Intellectual Property (IP) has taken a prominent place on the web. Today's organisations need to know the ways in which their websites can be the target of costly IP litigat...
Holger M. Kienle, Daniel M. Germán, Scott R...