Sciweavers

2504 search results - page 30 / 501
» Enterprise Security Architecture
Sort
View
SIGMOD
2005
ACM
169views Database» more  SIGMOD 2005»
15 years 5 months ago
Data and metadata management in service-oriented architectures: some open challenges
Over the last decade, the role of information technology in enterprises has been transforming from one of providing automation services to one of enabling business innovation. ITâ...
Vishal Sikka
ESORICS
2004
Springer
15 years 5 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
COLCOM
2007
IEEE
15 years 6 months ago
Kademlia for data storage and retrieval in enterprise networks
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
Natalya Fedotova, Stefano Fanti, Luca Veltri
IAW
2003
IEEE
15 years 5 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
EDOC
2007
IEEE
15 years 6 months ago
Structuring Software Cities A Multidimensional Approach
IT application landscapes alias software cities of large enterprises comprise tens or even hundreds of IT applications. Structuring software cities into domains is an important tas...
Andreas Hess, Bernhard Humm, Markus Voß, Gre...