Sciweavers

2826 search results - page 353 / 566
» A resource-based analysis of IT sourcing
Sort
View
IADIS
2003
15 years 3 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
USS
2004
15 years 3 months ago
Privtrans: Automatically Partitioning Programs for Privilege Separation
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
David Brumley, Dawn Xiaodong Song
ISTA
2003
15 years 3 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
COLING
2000
15 years 3 months ago
Exogeneous and Endogeneous Approaches to Semantic Categorization of Unknown Technical Terms
Acquiring and updating terminological resources are di cult and tedious tasks, especially when semantic information should be provided. This paper deals with Term Semantic Categor...
Farid Cerbah
ECIS
2000
15 years 3 months ago
Electronic Multidimensional Auctions and the Role of Information Feedback
Traditionally, companies aiming to achieve competition among suppliers have used sealed bidding procedures in their sourcing processes. The advances in information technology and i...
Otto R. Koppius, Manoj Kumar, Eric van Heck