• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 695
Next 10 →

Table 3. Safeguards Selector Safeguard Status

in How Much Is Enough? A Risk-Management Approach to Computer Security
by Kevin Soo Hoo
"... In PAGE 7: ...able 2. CSI/FBI Reported Financial Losses Due to Security Incidents .........................42 Table3 .... In PAGE 58: ... The Safeguard Selector is a switch that allows the user to include different safeguard combinations in each policy alternative. As shown in Table3 , the 1s, indicating inclusion,... ..."

Table 6 Comparison of IT security safeguard protection class items

in INFORMATION SYSTEMS MANAGEMENT MATURITY AND
by Garry Spicer, Garry D. Spicer, Garry Spicer, Michael Basil Ph. D
"... In PAGE 6: ...able 5 Comparison of IT security effectiveness items................................................... 32 Table6 Comparison of IT security safeguard protection class items.... ..."

Table 4. Safeguard Reductions in Bad Event Frequencies Info

in How Much Is Enough? A Risk-Management Approach to Computer Security
by Kevin Soo Hoo
"... In PAGE 7: ...able 3. Safeguards Selector ......................................................................................51 Table4 .... In PAGE 60: ... Tables 4 and 5 contain matrices of such expert opinions. Table4 shows the fractional reductions in bad event frequencies, while Table 5 shows the fractional reductions in bad event consequences. Although given as point estimates, these values will be varied from one-half and two times the listed value in model sensitivity analysis to determine whether such differences materially affect the decision.... ..."

Table 5. Safeguard Reductions in Bad Event Consequences Info

in How Much Is Enough? A Risk-Management Approach to Computer Security
by Kevin Soo Hoo
"... In PAGE 7: ...able 4. Safeguard Reductions in Bad Event Frequencies ............................................52 Table5 .... In PAGE 60: ... Tables 4 and 5 contain matrices of such expert opinions. Table 4 shows the fractional reductions in bad event frequencies, while Table5 shows the fractional reductions in bad event consequences. Although given as point estimates, these values will be varied from one-half and two times the listed value in model sensitivity analysis to determine whether such differences materially affect the decision.... ..."

Table 4: Randomly generated feasible problems with full safeguards

in Optimization with Semidefinite, Quadratic and Linear Constraints
by F. Alizadeh, S. H. Schmieta 1997
Cited by 13

Table 2.1: Safeguard Audit Data Mappings to Measures

in [1]R.Jagannathan,T.F.Lunt,F.Gilham,A.Tamaru,C.Jalali,P.Neumann,D.Anderson,T.D. Bibliography [2]R.Jagannathan,A.Tamaru,F.Gilham,D.Anderson,C.JalaliandC.Dodd,H.S.Javitz, Garvey,andJ.Lowrance.Requirementsspecication:Nextgenerationintrusion-detection expertsy
by H. S. Javitz, A. Valdes, T. F. Lunt, A. Tamaru, M. Tyson, J. Lowrance. Nextgeneration A. Valdes, T. F. Lunt, Sri International

Table 5: Organizational level evaluation of the methods Organizational

in unknown title
by unknown authors

Table 3: Organizational factors

in An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan
by Wei Liu, Hideyuki Tanaka, Kanta Matsuura
"... In PAGE 7: ... Consequently, the number of total enterprises narrowed to 2029. The statistics of organizational factors, e-mail account number and system vulnerability score, are as Table3 shows. Table 3: Organizational factors... ..."

Table 4. Organizational roles

in An Agent-Oriented Software Engineering Methodology with Application of Information Gathering Systems for LCC
by Tiemei Irene Zhang, Elizabeth Kendall, Harvey Jiang 2002
"... In PAGE 9: ... When an organizational role acts as a Bodyguard or an Adapter, the database is the Target and the Subject. These roles are summarized in Table4 [29]. Table 4.... In PAGE 11: ... 5.3 Roles and Goal Assignment The organizational roles in Table4 are responsible for gathering information that is needed by algorithms in the CASA model. This information includes the product to be maintained, the plan and requirements to be implemented, labor and equipment to be used, materials to be consumed and spare parts that need to be purchased from sup- pliers.... ..."
Cited by 1

Table 1. Organizational items

in Collaborative Social Structures and Task Modelling Integration
by Victor M. R. Penichet, Fabio PaternĂ², J. A. Gallud, Maria D. Lozano
"... In PAGE 3: ...1 Basic concepts We use some concepts in our approach that are going to be briefly explained in this sub-section. Regarding organization, we use three concepts that we call organizational items: actor, role, and group, which are described in Table1 . Other concepts are used to express relationships and collaborations between the different classifiers: instantia- tion, aggregation, and cooperative interaction (Table 2).... In PAGE 7: ... 4.2 Role The role organizational item of the Role View (see Table1 ) is the one which has the most direct correspondence in the CTT task model, because the role concept is also considered in the CTT notation in the same way. In a CTT cooperative model, every role has an associated task diagram with all the tasks that are performed by such role.... ..."
Next 10 →
Results 1 - 10 of 695
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University