Sciweavers

291 search results - page 31 / 59
» IQM3: Information Quality Management Maturity Model
Sort
View
125
Voted
GCC
2003
Springer
15 years 7 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
CLUSTER
2004
IEEE
15 years 1 months ago
Resource Management for Ad-Hoc Wireless Networks with Cluster Organization
Boosted by technology advancements, government and commercial interest, ad-hoc wireless networks are emerging as a serious platform for distributed mission-critical applications. G...
Ionut Cardei, Srivatsan Varadarajan, Allalaghatta ...
ECSA
2010
Springer
15 years 2 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
MTSR
2007
Springer
15 years 8 months ago
Exploring aspects of scientific publishing in astrophysics and cosmology: the views of scientists
Scientists in astrophysics and cosmology make much use of the arXiv repository. Concerns raised by scientists in those fields about publication costs and delays, and the transparen...
Panayiota Polydoratou, Martin Moyle
ECIS
2001
15 years 3 months ago
Re orienting information systems for customer centric service: The case of the Greek Ministry of Finance
Governments are employing modern information and communication technologies to better serve society. Raising the effectiveness of government as well as the quality of the civil se...
Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiot...