Sciweavers

2504 search results - page 10 / 501
» Enterprise Security Architecture
Sort
View
TRUSTBUS
2007
Springer
15 years 3 months ago
On Device-Based Identity Management in Enterprises
Marco Casassa Mont, Boris Balacheff
WISA
2005
Springer
15 years 2 months ago
Key Factors Influencing Worm Infection in Enterprise Networks
Urupoj Kanlayasiri, Surasak Sanguanpong
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
WETICE
1996
IEEE
15 years 1 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
ICEIS
1999
IEEE
15 years 1 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos