Sciweavers

2376 search results - page 108 / 476
» CM - Configuration Change Management
Sort
View
IDTRUST
2009
ACM
15 years 8 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
IDEAS
2009
IEEE
104views Database» more  IDEAS 2009»
15 years 8 months ago
An organizational file permission management system using the cellular data system
In designing dynamic situations such as cyberworlds, we the Incrementally Modular Abstraction Hierarchy (IMAH) to be an appropriate mathematical background to model dynamically ch...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
15 years 8 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
ICAC
2008
IEEE
15 years 8 months ago
1000 Islands: Integrated Capacity and Workload Management for the Next Generation Data Center
Recent advances in hardware and software virtualization offer unprecedented management capabilities for the mapping of virtual resources to physical resources. It is highly desira...
Xiaoyun Zhu, Donald Young, Brian J. Watson, Zhikui...
LCN
2008
IEEE
15 years 8 months ago
Managing energy use in a network with a new SNMP Power State MIB
— Energy consumption has become a major factor in the total cost of ownership (TCO) of IT equipment. The power state of IT equipment is effectively “invisible” to the network...
Francisco Blanquicet, Kenneth J. Christensen