Sciweavers

2588 search results - page 45 / 518
» Project risk management
Sort
View
SACMAT
2003
ACM
14 years 26 days ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
PRDC
2006
IEEE
14 years 1 months ago
Ontology based IT-security planning
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
Stefan Fenz, Edgar Weippl
IUSED
2008
13 years 9 months ago
Reducing Risk through Human Centred Design
The National Academy of Science's report on Human-System Integration in the system development process (NAS HSI report) [12] explains how human needs can be integrated into s...
Nigel Bevan
VOTEID
2007
Springer
14 years 1 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
EMISA
2004
Springer
14 years 1 months ago
Towards an integration of the cooperative design context in collaborative tools
: In a design project, the actors cooperate to achieve a same objective, which can be the production of a document, a manufactured product, a plane or a building. The role of a coo...
Gilles Halin, Damien Hanser, Sylvain Kubicki