Sciweavers

2504 search results - page 25 / 501
» Enterprise Security Architecture
Sort
View
SASO
2007
IEEE
15 years 6 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 5 months ago
Open Source Enterprise Systems: Towards a Viable Alternative
Enterprise systems are located within the antinomy of appearing as generic product, while being means of multiple integrations for the user through configuration and customisation...
Alexander Dreiling, Helmut Klaus, Michael Rosemann...
ICYCS
2008
IEEE
15 years 6 months ago
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway to endpoints. Just as its name suggested, the TNC-UTM solution combines two popular tec...
Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, X...
WCNC
2008
IEEE
15 years 6 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
OTM
2005
Springer
15 years 5 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert