Sciweavers

915 search results - page 158 / 183
» Security in Business Process Engineering
Sort
View
DSN
2004
IEEE
15 years 1 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
IWAN
2000
Springer
15 years 1 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
DATE
2009
IEEE
229views Hardware» more  DATE 2009»
15 years 4 months ago
Health-care electronics The market, the challenges, the progress
— Exploding health care demands and costs of aging and stressed populations necessitate the use of more in-home monitoring and personalized health care. Electronics hold great pr...
Wolfgang Eberle, Ashwin S. Mecheri, Thi Kim Thoa N...
VLDB
1994
ACM
121views Database» more  VLDB 1994»
15 years 1 months ago
An Overview of Repository Technology
A repository is a shareddatabaseof information aboutengineeredartifacts.Wedefinea repository manager to be a databaseapplication that suPports checkout/checkin, version and config...
Philip A. Bernstein, Umeshwar Dayal