Sciweavers

2504 search results - page 50 / 501
» Enterprise Security Architecture
Sort
View
CSFW
2002
IEEE
15 years 4 months ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
CAISE
2006
Springer
15 years 3 months ago
Boosting the Availability of Information Systems by Data Replication
High availability of information in medium and large-sized enterprises may naturally benefit from a wide-area replication of data. We discuss recent developments of replication arc...
José Enrique Armendáriz-Iñigo...
OOPSLA
2009
Springer
15 years 6 months ago
Dependable, online upgrades in enterprise systems
Software upgrades are unreliable, often causing downtime or data loss. I propose Imago, an approach for removing the leading causes of upgrade failures (broken dependencies) and o...
Tudor Dumitras
ECBS
2007
IEEE
132views Hardware» more  ECBS 2007»
15 years 6 months ago
The Strategic Impact of Service Oriented Architectures
It has not been since the advent of the client/server architecture break through that an architectural concept has changed the face of enterprise systems so significantly as it h...
Philipp Liegl
CSREASAM
2003
15 years 1 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...