Sciweavers

2795 search results - page 372 / 559
» Recommendations on recommendations
Sort
View
DSN
2008
IEEE
14 years 4 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
HICSS
2008
IEEE
116views Biometrics» more  HICSS 2008»
14 years 4 months ago
Web Accessibility for the Blind: Corporate Social Responsibility or Litigation Avoidance?
On September 5, 2006, a legal precedent was set for web accessibility. Federal judge Marilyn Patel sustained discrimination claims by the National Federation for the Blind against...
Jonathan Frank
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 4 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 4 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...