Sciweavers

669 search results - page 74 / 134
» Managing the Risk of IT Outsourcing
Sort
View
DBSEC
2008
196views Database» more  DBSEC 2008»
15 years 1 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
ECIS
2003
15 years 1 months ago
Adoption trends in application service provisioning: an exploratory field study of small and medium-size enterprises
This paper describes an exploratory field study on the adoption of Application Service Provisioning (ASP) in Small and Medium-sized Enterprises (SMEs). Rooted in Merton’s Motiva...
Ryan Peterson, Alea M. Fairchild
CCR
2011
14 years 3 months ago
Dynamically scaling applications in the cloud
Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an “advanced outsourcing” solu...
Luis M. Vaquero, Luis Rodero-Merino, Rajkumar Buyy...
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 7 days ago
Discovering significant rules
In many applications, association rules will only be interesting if they represent non-trivial correlations between all constituent items. Numerous techniques have been developed ...
Geoffrey I. Webb
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
15 years 6 months ago
Building Leadership for Life Cycle Business Transition by Hybrid Innovation
Manufacturing companies that are expanding their product offering to cover also lifecycle services in the customers’ facilities are facing the increasing complexity and risk to ...
Vesa Salminen