Sciweavers

2504 search results - page 15 / 501
» Enterprise Security Architecture
Sort
View
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 3 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
104
Voted
EMISA
2005
Springer
15 years 3 months ago
A Comprehensive Enterprise Architecture Metamodel
Abstract Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A...
Christian Braun, Robert Winter
IESA
2007
14 years 11 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
88
Voted
SIGMOD
2005
ACM
146views Database» more  SIGMOD 2005»
15 years 3 months ago
Impact of SOA on enterprise information architectures
Enterprises are looking to find new and cost effective means to leverage existing investments in IT infrastructure and incorporate new capabilities in order to improve business pr...
Paul Patrick
WEBI
2004
Springer
15 years 2 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen