Sciweavers

2504 search results - page 49 / 501
» Enterprise Security Architecture
Sort
View
DRMTICS
2005
Springer
15 years 1 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
JAMIA
2010
131views more  JAMIA 2010»
14 years 6 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
ESSOS
2009
Springer
15 years 6 months ago
Report: Measuring the Attack Surfaces of Enterprise Software
Abstract. Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security ...
Pratyusa K. Manadhata, Yücel Karabulut, Jeann...
IFIPTM
2010
204views Management» more  IFIPTM 2010»
14 years 10 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
BPM
2005
Springer
117views Business» more  BPM 2005»
15 years 5 months ago
Interoperability in Service-Based Communities
Interoperability is a multifaceted problem caused by issues surpassing those of technological incompatibilities. The real interoperability challenges are stemming from various sour...
Toni Ruokolainen, Lea Kutvonen