Sciweavers

413 search results - page 33 / 83
» It outsourcing maturity model
Sort
View
ESA
2010
Springer
170views Algorithms» more  ESA 2010»
15 years 1 days ago
Streaming Graph Computations with a Helpful Advisor
Motivated by the trend to outsource work to commercial cloud computing services, we consider a variation of the streaming paradigm where a streaming algorithm can be assisted by a...
Graham Cormode, Michael Mitzenmacher, Justin Thale...
EDOC
2011
IEEE
13 years 10 months ago
Resource and Agreement Management in Dynamic Crowdcomputing Environments
Abstract—Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowdsourcing environments tha...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
CCS
2006
ACM
15 years 2 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ECIS
2004
15 years 10 days ago
Value-based business modelling for network organizations: lessons learned from the electricity sector
Speed and availability of information, delivered in past years by Internet technologies, made it easier for any company to outsource primary activities, which resulted in unbundli...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
78
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
15 years 11 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...