Sciweavers

606 search results - page 28 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
BPM
2005
Springer
118views Business» more  BPM 2005»
15 years 5 months ago
Applying Enterprise Models to Design Cooperative Scientific Environments
Scientific experiments are supported by activities that create, use, communicate and distribute information whose organizational dynamics is similar to processes performed by distr...
Andrea Bosin, Nicoletta Dessì, Maria Grazia...
RAID
2010
Springer
14 years 9 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
ISSRE
2007
IEEE
15 years 1 months ago
Towards Self-Protecting Enterprise Applications
Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and impl...
Davide Lorenzoli, Leonardo Mariani, Mauro Pezz&egr...
CORR
2010
Springer
388views Education» more  CORR 2010»
14 years 12 months ago
Research Challenges for Enterprise Cloud Computing
Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale ...
Ali Khajeh-Hosseini, Ian Sommerville, Ilango Srira...
COMSWARE
2007
IEEE
15 years 6 months ago
Role Based Access Control for UDDI Inquiries
— Web Services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list...
Raymond Peterkin, Jinsuk Solomon, Dan Ionescu