Sciweavers

16 search results - page 3 / 4
» Usability meets access control: challenges and research oppo...
Sort
View
WSC
1998
13 years 6 months ago
Implementing the Theory of Constraints Philosophy in Highly Reentrant Systems
A significant challenge in implementing the Theory of Constraints in the semiconductor industry is the complex and reentrant nature of the manufacturing process. Managing a constr...
Clay Rippenhagen, Shekar Krishnaswamy
SDMW
2005
Springer
13 years 10 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
JASIS
2007
128views more  JASIS 2007»
13 years 5 months ago
The changing nature of information work in museums
This paper presents results from twenty-one semi-structured interviews with museum information professionals (MIPs) who were asked about their experiences working with information...
Paul F. Marty
OZCHI
2006
ACM
13 years 11 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 5 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed