Sciweavers

2454 search results - page 240 / 491
» Privacy in the Information and Communications Technologies
Sort
View
DEXAW
2006
IEEE
156views Database» more  DEXAW 2006»
15 years 8 months ago
Social Enterprise Architecture: Towards an Extendable and Scaleable System Architecture for KM
Internet should be used to reduce distances and bring people virtually closer. Using ICT, many people has overcome the problem of digital divided [1] thanks to support of informat...
Flavio Corradini, Alberto Polzonetti, Romeo Pruno,...
106
Voted
EEE
2005
IEEE
15 years 7 months ago
Composition of Negotiation Protocols for E-Commerce Applications
A company doing e-business needs capabilities to negotiate electronically the parameters of its deals in order to fully utilize the potential of the Information and Communication ...
Nikolay K. Diakov, Zlatko Zlatev, Stanislav Pokrae...
105
Voted
JUCS
2010
134views more  JUCS 2010»
15 years 8 days ago
Leveraging ICT Deployment and Integration in a Public Organization Aged 176 Years A Greek Case Study
: The successful deployment and exploitation of an Information and Communications Technologies (ICT) project in a traditional Public Organization involves the proper design and imp...
Melpomeni Hatzikou, Iraklis-Panagiotis Agiovlasiti...
DIM
2005
ACM
15 years 3 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 7 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan