Sciweavers

95 search results - page 9 / 19
» Risk assessment in distributed authorization
Sort
View
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
14 years 1 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson
EDOC
2005
IEEE
14 years 1 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ECTEL
2007
Springer
14 years 1 months ago
CAMEL: Taking the Technology Enhanced Learning Journey without Reinventing the Wheel
Projects involving technology are notoriously dogged with difficulties and a number of lessons can be learned. Rather than detail examples from particular TEL projects, the author ...
Gill Ferrell
CHI
2008
ACM
14 years 7 months ago
Design, adoption, and assessment of a socio-technical environment supporting independence for persons with cognitive disabilitie
A significant fraction of persons with cognitive disabilities are potentially able to live more independently with the use of powerful tools embedded in their social environment. ...
Stefan Carmien, Gerhard Fischer