Sciweavers

669 search results - page 61 / 134
» Managing the Risk of IT Outsourcing
Sort
View
PVLDB
2008
216views more  PVLDB 2008»
14 years 10 months ago
Ad-hoc data processing in the cloud
Ad-hoc data processing has proven to be a critical paradigm for Internet companies processing large volumes of unstructured data. However, the emergence of cloud-based computing, ...
Dionysios Logothetis, Ken Yocum
CLOUDCOM
2009
Springer
15 years 6 months ago
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud comp...
Siani Pearson, Yun Shen, Miranda Mowbray
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 4 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 5 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
CII
2006
125views more  CII 2006»
14 years 12 months ago
Agent-based model for managing composite product information
The importance of product information management during the whole lifetime of the product has increased due to the technical sophistication of products as well as stricter governm...
Kary Främling, Timo Ala-Risku, Mikko Kär...