Sciweavers

1641 search results - page 303 / 329
» Subject Composition by Roles
Sort
View
97
Voted
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 5 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
98
Voted
CCS
2001
ACM
15 years 5 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CIKM
2001
Springer
15 years 5 months ago
X007: Applying 007 Benchmark to XML Query Processing Tool
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Stéphane Bressan, Gillian Dobbie, Zoé...
IV
2000
IEEE
107views Visualization» more  IV 2000»
15 years 4 months ago
Ideograms in Polyscopic Modeling
“addiction” is defined as a pattern (abstract relationship). Such definition allows us to look in a new way at a number of cultural issues including the values, the lifestyl...
Dino Karabeg
ELPUB
1998
ACM
15 years 4 months ago
Towards an Information-Rich Society? Or an Information-Overloaded One? (Is the Media Becoming More Important Than the Message?)
The rapid growth in all forms of electronic publishing is creating many new problems – both technical and socio-economic. This paper examines some of these from three different ...
T. M. R. Ellis