Sciweavers

669 search results - page 99 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ECTEL
2007
Springer
14 years 5 months ago
CAMEL: Taking the Technology Enhanced Learning Journey without Reinventing the Wheel
Projects involving technology are notoriously dogged with difficulties and a number of lessons can be learned. Rather than detail examples from particular TEL projects, the author ...
Gill Ferrell
IEEEARES
2006
IEEE
14 years 4 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
NDSS
2005
IEEE
14 years 4 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
PRDC
2005
IEEE
14 years 4 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
WORDS
2005
IEEE
14 years 4 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...