Sciweavers

1559 search results - page 244 / 312
» Ontologies for Enterprise Integration
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 4 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 4 months ago
Digital Pen: Four Rounds of Ethnographic and Field Research
We report on a year-long qualitative and ethnographic project to examine the value of digital pen technology for note taking. A digital pen captures a facsimile of information wri...
Christopher N. Chapman, Michal Lahav, Susan Burges...
ICNS
2008
IEEE
15 years 4 months ago
Enhancing User-Service Interaction through a Global User-Centric Approach to SOA
Considered as enablers of seamless application-toapplication integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused o...
Javier Soriano, David Lizcano, Juan José Hi...
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
15 years 4 months ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...