Sciweavers

2504 search results - page 73 / 501
» Enterprise Security Architecture
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
PDPTA
2004
15 years 1 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
JDCTA
2008
160views more  JDCTA 2008»
14 years 12 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
EDOC
2006
IEEE
15 years 6 months ago
Specifying and Controlling Multi-Channel Web Interfaces for Enterprise Applications
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
Matthias Book, Volker Gruhn
WIRTSCHAFTSINFORMATI
2007
15 years 1 months ago
Optimized Dynamic Allocation Management for ERP Systems and Enterprise Services
To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP) and enterprise services, a peak-load oriented hardware sizing is often used, wh...
Valentin Nicolescu, Martin Wimmer, Raphael Geissle...