Sciweavers

2504 search results - page 64 / 501
» Enterprise Security Architecture
Sort
View
ESEM
2007
ACM
15 years 3 months ago
Proposal of a Complete Life Cycle In-Process Measurement Model Based on Evaluation of an In-Process Measurement Experiment Using
This paper focuses on in-process measurements during requirements definition where measurements of processes and products are relatively difficult. However, development processes ...
Yoshiki Mitani, Tomoko Matsumura, Mike Barker, Sei...
ICEGOV
2009
ACM
14 years 9 months ago
Architecting the connected government: practices and innovations in Singapore
Countries aiming to transform their Governments require a more sophisticated e-government model
Pallab Saha
FTDCS
1997
IEEE
15 years 4 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
CAD
2000
Springer
14 years 11 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
ETFA
2005
IEEE
15 years 5 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver