Sciweavers

4923 search results - page 58 / 985
» Software Risk Management
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
IDTRUST
2009
ACM
14 years 3 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
WSC
2007
13 years 11 months ago
Simulation of adaptive project management analytics
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...
Léa Amandine Deleris, Sugato Bagchi, Shubir...
DGO
2008
135views Education» more  DGO 2008»
13 years 10 months ago
Florida Public Hurricane Loss Model (FPHLM): research experience in system integration
The Florida Public Hurricane Loss Model (FPHLM) developed in the State of Florida offers an open, public and effective tool for the government to regulate the insurance ratemaking...
Shu-Ching Chen, Min Chen, Na Zhao, Shahid Hamid, K...
IEEEARES
2010
IEEE
14 years 3 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais