-
1
-
-
84910145260
-
Application of fuzzy logic for risk assessment using risk matrix
-
Abul-Haggag, O.Y. & Barakat, W., 2013. Application of Fuzzy Logic for Risk Assessment using Risk Matrix. International Journal of Emerging Technology and Advanced Engineering, 3(1), pp.49-54.
-
(2013)
International Journal of Emerging Technology and Advanced Engineering
, vol.3
, Issue.1
, pp. 49-54
-
-
Abul-Haggag, O.Y.1
Barakat, W.2
-
3
-
-
34548769351
-
Fuzzy multi - level security: An experiment on quantified risk -Adaptive access control
-
Chen, P. et al., 2007. Fuzzy Multi - Level Security : An Experiment on Quantified Risk -Adaptive Access Control. 2007 IEEE Symposiu m on Security and Privacy(SP'07), pp.222-227.
-
(2007)
2007 IEEE Symposiu M on Security and Privacy(SP'07)
, pp. 222-227
-
-
Chen, P.1
-
6
-
-
84951299033
-
Monte Carlo simulation applied to support risk-based decision making in electricity distribution networks
-
Goerdin, S.A. V, Smit, J.J. & Mehairjan, R.P.Y., 2015a. Monte Carlo simulation applied to support risk-based decision making in electricity distribution networks. 2015 IEEE Eindhoven PowerTech, PowerTech 2015.
-
(2015)
2015 IEEE Eindhoven PowerTech, PowerTech 2015
-
-
Goerdin, S.A.V.1
Smit, J.J.2
Mehairjan, R.P.Y.3
-
7
-
-
84951299033
-
Monte carlo simulation applied to support risk-based decision making in electricity distribution networks
-
Goerdin, S.A. V, Smit, J.J. & Mehairjan, R.P.Y., 2015b. Monte Carlo simulation applied to support risk-based decision making in electricity distribution networks. 2015 IEEE Eindhoven PowerTech.
-
(2015)
2015 IEEE Eindhoven PowerTech
-
-
Goerdin, S.A.V.1
Smit, J.J.2
Mehairjan, R.P.Y.3
-
9
-
-
84906991657
-
Game-based adaptive security in the Internet of Things for eHealth
-
Hamdi, M. & Abie, H., 2014. Game-based adaptive security in the Internet of Things for eHealth. 2014 IEEE International Conference on Communications, ICC 2014, pp.920-925.
-
(2014)
2014 IEEE International Conference on Communications, ICC
, vol.2014
, pp. 920-925
-
-
Hamdi, M.1
Abie, H.2
-
10
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
Kahneman, D., Slovic, P. & Tversky, A., 1974. Judgment under uncertainty: Heuristics and biases. Science, 185(4157), pp.1124-1131.
-
(1974)
Science
, vol.185
, Issue.4157
, pp. 1124-1131
-
-
Kahneman, D.1
Slovic, P.2
Tversky, A.3
-
11
-
-
84888304052
-
A framework for risk assessment in access control systems
-
Sec 2012
-
Khambhammettu, H. et al., 2013. A framework for risk assessment in access control systems. Computers & Security, 39(Sec 2012), pp.86-103.
-
(2013)
Computers & Security
, vol.39
, pp. 86-103
-
-
Khambhammettu, H.1
-
12
-
-
70449115569
-
Quantifying IT estimation risks
-
Kulk, G.P., Peters, R.J. & Verhoef, C., 2009. Quantifying IT estimation risks. Science of Computer Programming, 74(11-12), pp.900-933.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.11-12
, pp. 900-933
-
-
Kulk, G.P.1
Peters, R.J.2
Verhoef, C.3
-
13
-
-
84960912514
-
Enhancing cloud security through access control models: A survey
-
Langaliya, C. & Aluvalu, R., 2015. Enhancing Cloud Security through Access Control Models : A Survey. International Journal of Computer Applications, 112(7), pp.8-12.
-
(2015)
International Journal of Computer Applications
, vol.112
, Issue.7
, pp. 8-12
-
-
Langaliya, C.1
Aluvalu, R.2
-
14
-
-
84893460788
-
A fuzzy modeling approach for risk-based access control in eHealth cloud
-
TrustCom 2013
-
Li, J., Bai, Y. & Zaman, N., 2013. A fuzzy modeling approach for risk-based access control in eHealth cloud. Proceedings - 12th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications, TrustCom 2013, pp.17-23.
-
(2013)
Proceedings - 12th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
, pp. 17-23
-
-
Li, J.1
Bai, Y.2
Zaman, N.3
-
15
-
-
84866349735
-
Authentication and access control in the Internet of things
-
Liu, J., Xiao, Y. & Chen, C.L.P., 2012. Authentication and access control in the Internet of things. Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, pp.588-592.
-
(2012)
Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012
, pp. 588-592
-
-
Liu, J.1
Xiao, Y.2
Chen, C.L.P.3
-
16
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
New York, NY, USA: ACM
-
Ni, Q., Bertino, E. & Lobo, J., 2010. Risk-based access control systems built on fuzzy inferences. in Proceedings of the 5th ACM Symposium on Information, Computer, and Communications Security, ser. ASIACCS 10. New York, NY, USA: ACM, pp.250- 260.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer, and Communications Security, Ser. ASIACCS 10
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
17
-
-
84878117524
-
Expert judfgement in risk analysis: A strategy to overcome uncertainities
-
Pluess, D., Groso, A. & Meyer, T., 2013. Expert Judfgement in Risk Analysis: A Strategy to Overcome Uncertainities. Chemical Engineering Transactions, 31, pp.307-312.
-
(2013)
Chemical Engineering Transactions
, vol.31
, pp. 307-312
-
-
Pluess, D.1
Groso, A.2
Meyer, T.3
-
20
-
-
84894170461
-
Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation
-
Ricardo dos Santos, D., Westphall, C.M. & Westphall, C.B., 2013. Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation. Proceedings of the Seventh International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE 2013), pp.8-13.
-
(2013)
Proceedings of the Seventh International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE 2013)
, pp. 8-13
-
-
Ricardo Dos Santos, D.1
Westphall, C.M.2
Westphall, C.B.3
-
21
-
-
84904176597
-
A dynamic risk-based access control architecture for cloud computing
-
Dos Santos, D.R., Westphall, C.M. & Westphall, C.B., 2014. A dynamic risk-based access control architecture for cloud computing. IEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World, pp.1-9.
-
(2014)
IEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World
, pp. 1-9
-
-
Dos Santos, D.R.1
Westphall, C.M.2
Westphall, C.B.3
-
22
-
-
84861100364
-
Dynamic riskbased decision methods for access control systems
-
Shaikh, R.A., Adi, K. & Logrippo, L., 2012. Dynamic riskbased decision methods for access control systems. Computers and Security, 31(4), pp.447-464.
-
(2012)
Computers and Security
, vol.31
, Issue.4
, pp. 447-464
-
-
Shaikh, R.A.1
Adi, K.2
Logrippo, L.3
-
23
-
-
84946232551
-
Architecture for Internet of Things to minimize human intervention
-
Shanbhag, R. & Shankarmani, R., 2015. Architecture for Internet of Things to minimize human intervention. 2015 International Conference on Advances in Computing, Communications, and Informatics, ICACCI 2015, pp.2348-2353.
-
(2015)
2015 International Conference on Advances in Computing, Communications, and Informatics, ICACCI 2015
, pp. 2348-2353
-
-
Shanbhag, R.1
Shankarmani, R.2
-
24
-
-
84926646703
-
Applying fuzzy logic to risk assessment and decision-making
-
Canadian Institute of Actuaries, Society of Actuaries
-
Shang, K. & Hossen, Z., 2013. Applying Fuzzy Logic to Risk Assessment and Decision-Making. Casualty Actuarial Society, Canadian Institute of Actuaries, Society of Actuaries, pp.1-59.
-
(2013)
Casualty Actuarial Society
, pp. 1-59
-
-
Shang, K.1
Hossen, Z.2
-
25
-
-
85024367268
-
-
Nist Special Publication Sp
-
Stoneburner, G., Goguen, A. & Feringa, A., 2002. Risk Management Guide for Information Technology Systems. Nist Special Publication Sp, 30(30).
-
(2002)
Risk Management Guide for Information Technology Systems
, vol.30
, Issue.30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
26
-
-
17644399080
-
Risk management guide for information technology systems
-
Stoneburner, G., Goguen, A. & Feringa, A., 2002. Risk Management Guide for Information Technology Systems. Nist Special Publication, 19, p.58.
-
(2002)
Nist Special Publication
, vol.19
, pp. 58
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
27
-
-
84895134059
-
A vertical handoff method via self- selection decision tree for internet of vehicles
-
Wang, S. et al., 2016. A Vertical Handoff Method via Self- Selection Decision Tree for Internet of Vehicles. IEEE Systems Journal, 10(3), pp.1183-1192.
-
(2016)
IEEE Systems Journal
, vol.10
, Issue.3
, pp. 1183-1192
-
-
Wang, S.1
-
28
-
-
84894059526
-
An efficient authentication and access control scheme for perception layer of internet of things
-
Ye, N. et al., 2014. An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics and Information Sciences, 8(4), pp.1617-1624.
-
(2014)
Applied Mathematics and Information Sciences
, vol.8
, Issue.4
, pp. 1617-1624
-
-
Ye, N.1
-
30
-
-
85024367624
-
-
Zhi, L., Jing, W. & Xiao-su, C., 2009. Research on Policybased Access Control Model., (1), pp.164-167.
-
(2009)
Research on Policybased Access Control Model
, Issue.1
, pp. 164-167
-
-
Zhi, L.1
Jing, W.2
Xiao-Su, C.3
|