Sciweavers

2454 search results - page 166 / 491
» Privacy in the Information and Communications Technologies
Sort
View
97
Voted
HICSS
2000
IEEE
138views Biometrics» more  HICSS 2000»
15 years 6 months ago
The NZDIS Project: An Agent-based Distributed Information Systems Architecture
This paper describes an architecture for building distributed information systems from existing information resources, based on software agent and distributed object technologies....
Martin K. Purvis, Stephen Cranefield, Geoff Bush, ...
ISCC
1999
IEEE
121views Communications» more  ISCC 1999»
15 years 6 months ago
Customer Service Management: Towards a Management Information Base for an IP Connectivity Service
Customer Service Management (CSM) offers a management interface between customer and service provider, which enables customers to individually monitor and control their subscribed...
Michael Langer, Stefan Loidl, Michael Nerb
ECIS
2003
15 years 3 months ago
E-learning: designing new business education
Business Schools are experiencing increased competitive pressures, and one way to differentiate and compete distinctively is through the adoption of innovative uses of information...
Cristina Cáliz, Sandra Sieber
IEEEARES
2006
IEEE
15 years 7 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
ACSAC
2000
IEEE
15 years 6 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky