Sciweavers

414 search results - page 23 / 83
» Secure Border Control Processes
Sort
View
ACSAC
1999
IEEE
15 years 4 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
COMCOM
2008
138views more  COMCOM 2008»
14 years 12 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ECIS
2004
15 years 1 months ago
Inter-organizational knowledge management systems: typology and cases
Although companies are more and more developing complex networks of connections with their partners and customers and shifting their focus towards expanding the knowledge manageme...
Kostas Kafentzis, Dimitris Apostolou, Gregoris Men...
HIPEAC
2005
Springer
15 years 5 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 4 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...