Sciweavers

744 search results - page 27 / 149
» The Traust Authorization Service
Sort
View
ISF
2008
104views more  ISF 2008»
14 years 9 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
JCS
2010
104views more  JCS 2010»
14 years 8 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
CHI
2010
ACM
15 years 4 months ago
Understanding the space for co-design in riders' interactions with a transit service
The recent advances in web 2.0 technologies and the rapid adoption of smart phones raises many opportunities for public services to improve their services by engaging their users ...
Daisy Yoo, John Zimmerman, Aaron Steinfeld, Anthon...
CNSM
2010
14 years 7 months ago
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains
Abstract--Change Management, a core process of the Information Technology Infrastructure Library (ITIL), is concerned with the management of changes to IT infrastructure and servic...
Sebastian Hagen, Alfons Kemper
SIGMETRICS
2010
ACM
131views Hardware» more  SIGMETRICS 2010»
14 years 4 months ago
Energy efficient management of two cellular access networks
In this paper we evaluate the energy saving that can be achieved with the energy-aware cooperative management of the cellular access networks of two operators offering service ove...
Marco Ajmone Marsan, Michela Meo