Sciweavers

422 search results - page 13 / 85
» Risk management for distributed authorization
Sort
View
ECAL
2003
Springer
14 years 1 months ago
Building a Hybrid Society of Mind Using Components from Ten Different Authors
Building large complex minds is difficult because we do not understand what the necessary components are or how they should interact. Even if the components were known it is diffic...
Ciarán O'Leary, Mark Humphrys
CSREASAM
2003
13 years 9 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
IDTRUST
2009
ACM
14 years 3 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
CLOUDCOM
2009
Springer
14 years 3 months ago
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud comp...
Siani Pearson, Yun Shen, Miranda Mowbray
BIB
2011
13 years 2 days ago
Using cross-validation to evaluate predictive accuracy of survival risk classifiers based on high-dimensional data
Developments in whole genome biotechnology have stimulated statistical focus on prediction methods. We review here methodology for classifying patients into survival risk groups a...
Richard M. Simon, Jyothi Subramanian, Ming-Chung L...