Sciweavers

8767 search results - page 42 / 1754
» Enterprise Data Management
Sort
View
CCS
2009
ACM
16 years 13 days ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 5 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
CCE
2007
15 years 1 months ago
Product Based Interoperability - Approaches and Requirements
: Product data, information and knowledge are the core ICT resources for collaborative design. This paper describes five different approaches to exchanging and sharing product data...
Håvard D. Jørgensen, Dag Karlsen, Fra...
ECIS
2001
15 years 1 months ago
SMEs Co-opetition and Knowledge Sharing: The IS Role
Co-opetition, simultaneous co-operation and competition, is a recent phenomenon. Co-opetition entails sharing knowledge that may be a key source of competitive advantage. Yet, the...
Margi Levy, Claudia Löbbecke, Philip Powell
ACSAC
2000
IEEE
15 years 4 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...