Sciweavers

104 search results - page 15 / 21
» assets 2006
Sort
View
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 10 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
AMC
2007
123views more  AMC 2007»
13 years 8 months ago
Accurate pricing formulas for Asian options
Asian options have payoffs that depend on the average price of the underlying asset such as stocks, commodities, or financial indices. As exact closed-form formulas do not exist...
Kuan-Wen Chen, Yuh-Dauh Lyuu
CORR
2006
Springer
133views Education» more  CORR 2006»
13 years 8 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
ISSE
2006
13 years 8 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
ASSETS
2006
ACM
14 years 2 months ago
Interactive tracking of movable objects for the blind on the basis of environment models and perception-oriented object recognit
In previous work we have presented a prototype of an assistant system for the blind that can be used for self-localization and interactive object identification of static objects ...
Andreas Hub, Tim Hartter, Thomas Ertl