نتایج جستجو برای: based assessment

تعداد نتایج: 3358857  

2005
H. Mouratidis P. Giorgini

The consideration of security requirements in the development of multi-agent systems is a very difficult task. However, only few approaches have been proposed that try to integrate security issues as internal part of the development process. Amongst them, secure Tropos has been proposed as a structured approach towards the consideration of security issues in the development of multiagent system...

Journal: :J. UCS 2012
Ji Ma

Risk assessment and access control are important issues in cloud computing. In this paper, we propose a formal approach to risk assessment for RBAC Systems, in which access control decisions are taken after consideration of risk assessment. The risk assessment method considers partial orderings on objects and actions, which allow us to effectively capture the notions of importance of objects an...

2014
Julien Botella Bruno Legeard Fabien Peureux Alexandre Vernotte

This paper introduces an original security testing approach guided by risk assessment, by means of risk coverage, to perform and automate vulnerability testing for Web applications. This approach, called Risk-Based Vulnerability Testing, adapts Model-Based Testing techniques, which are mostly used currently to address functional features. It also extends Model-Based Vulnerability Testing techni...

1987
Suzanne Pinson

The complexity of finenciel decision-making problems is such that automation of the reasoning process by conventionel approaches is often incomplete or inadequete. This paper describes CREDEX. s knowledge-based system which is being developed to assist bank-loan officers in interpreting end evaluating the activities of firms applying for a loan. CREDEX is written in SNARK. It integrates shallow...

Journal: :IEICE Transactions 2014
Takako Nakatani Shouzo Hori Keiichi Katamine Michio Tsuda Toshihiko Tsumaki

SUMMARY The success of any project can be affected by requirements changes. Requirements elicitation is a series of activities of adding, deleting, and modifying requirements. We refer to the completion of requirements elicitation of a software component as requirements matura-tion. When the requirements of each component have reached the 100% maturation point, no requirement will come to the c...

2015
Neal Wagner Richard Lippmann Michael L. Winterrose James Riordan Tamara Yu William W. Streilein

Computer networks are present throughout all sectors of our critical infrastructure and these networks are under a constant threat of cyber attack. One prevalent computer network threat takes advantage of unauthorized, and thus insecure, hardware on a network. This paper presents a prototype simulation system for network risk assessment that is intended for use by administrators to simulate and...

2004
Steven Bogaerts David B. Leake

A fundamental problem for case-based reasoning systems is how to select relevant prior cases. Numerous strategies have been developed for determining the similarity of prior cases, given full descriptions of the problem at hand, and situation assessment methods have been developed for formulating appropriate initial case descriptions. However, in real-world applications, attempting to determine...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

the present study sought to investigate the role of dynamic assessment (da) in improvement of iranian efl writing performance at different language proficiency levels. to this end, after conducting the quick placement test, 60 iranian efl learners were assigned to two groups with different language proficiency levels. in both groups each participant wrote two compositions, one before and one af...

Journal: :Academic Medicine 1998

2007
Felix Flentge Uwe Beyer

The implementation-service-effect (ISE) metamodel is a general framework for modeling critical infrastructures that can integrate several different perspectives. The metamodel has a technical basis and also provides the abstractions needed for risk assessment and management of critical infrastructures in complex environments. ISE supports an iterative modeling approach that continuously refines...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید