Sciweavers

631 search results - page 71 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ISF
2008
104views more  ISF 2008»
15 years 1 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
AVI
2004
15 years 3 months ago
Integrating expanding annotations with a 3D explosion probe
Understanding complex 3D virtual models can be difficult, especially when the model has interior components not initially visible and ancillary text. We describe new techniques fo...
Henry Sonnet, M. Sheelagh T. Carpendale, Thomas St...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 8 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
BPM
2004
Springer
114views Business» more  BPM 2004»
15 years 7 months ago
Modeling Medical E-services
On the one hand Web services are gaining increasing attention. A lot of standardization has improved their stability and range of application. Composition and coordination techniqu...
Rainer Anzböck, Schahram Dustdar
IIS
2003
15 years 3 months ago
The Development of the Inductive Database System VINLEN: A Review of Current Research
Current research on the VINLEN inductive database system is briefly reviewed and illustrated by selected results. The goal of research on VINLEN is to develop a methodology for de...
Kenneth A. Kaufman, Ryszard S. Michalski