Sciweavers

176 search results - page 2 / 36
» Mobile-driven architecture for managing enterprise security ...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 3 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 5 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
AISS
2010
165views more  AISS 2010»
13 years 2 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
WECWIS
2005
IEEE
131views ECommerce» more  WECWIS 2005»
13 years 11 months ago
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures
Virtual Enterprises or Organisations (VO) have
Adomas Svirskas, Michael D. Wilson, Alvaro E. Aren...
CSREASAM
2003
13 years 6 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...