Sciweavers

23915 search results - page 157 / 4783
» Management
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...
NOMS
2006
IEEE
15 years 10 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
LCN
2005
IEEE
15 years 9 months ago
Network Management Challenges for Next Generation Networks
Generally, current network management technologies follow two approaches: ITU-T’s recommendations for Telecommunication Management Network (TMN) and IETF’s Simple Network Mana...
Mo Li, Kumbesan Sandrasegaran
CCGRID
2003
IEEE
15 years 9 months ago
GridFlow: Workflow Management for Grid Computing
Grid computing is becoming a mainstream technology for large-scale distributed resource sharing and system integration. Workflow management is emerging as one of the most importan...
Junwei Cao, Stephen A. Jarvis, Subhash Saini, Grah...