Sciweavers

5518 search results - page 997 / 1104
» Rule-Based Service Modeling
Sort
View
ECIS
2004
15 years 2 months ago
Constructing electronic government: the case of the UK inland revenue
The term electronic government (e-Government) generally refers to the use of information and communications technology (ICT) to change the structures and processes of government o...
Paul Beynon-Davies
DBSEC
2006
124views Database» more  DBSEC 2006»
15 years 2 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 2 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
ICWN
2004
15 years 2 months ago
QoS Support in Wireless Sensor Networks: A Survey
In this paper, we assess the state of the art of Quality of Services (QoS) support in wireless sensor networks (WSNs). Unlike traditional end-to-end multimedia applications, many n...
Dazhi Chen, Pramod K. Varshney
ECIS
2001
15 years 2 months ago
Consultancy Engagement and E-Business Development - A Case Analysis of Australian SMEs
The majority of SMEs have neither the internal expertise nor financial resources to enable in-house development of e-business and therefore turn to the services of website design ...
Shirley Bode, Janice M. Burn