Sciweavers

2504 search results - page 66 / 501
» Enterprise Security Architecture
Sort
View
POPL
2005
ACM
16 years 5 days ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
GCC
2006
Springer
15 years 3 months ago
Decentralized Workflow Execution for Virtual Enterprises in Grid Environment
With the emergence of global market and virtual enterprises, coordination of business processes in dispersed organizations by distributed workflow execution will take on more impo...
Wei Tan, Yushun Fan
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 5 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
ACSAC
2007
IEEE
15 years 6 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
AIWORC
2000
IEEE
15 years 4 months ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...