Sciweavers

669 search results - page 94 / 134
» Managing the Risk of IT Outsourcing
Sort
View
GCC
2003
Springer
15 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
CCS
2006
ACM
15 years 1 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ESEM
2008
ACM
14 years 11 months ago
Some lessons learned in conducting software engineering surveys in china
Component-Based Software Engineering (CBSE) with Open Source Software and Commercial-Off-the-Shelf (COTS) components, Open Source Software (OSS) based development, and Software Ou...
Junzhong Ji, Jingyue Li, Reidar Conradi, Chunnian ...
ECIS
2004
14 years 11 months ago
Organizational Performance of a Firm in a Modular Business Network
The organizational capabilities to interact with others have been greatly improved as a result of modern information and communications technologies: Nowadays a company can mainta...
Diederik W. van Liere, Lorike Hagdorn van der Meij...
CCS
2010
ACM
14 years 10 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu