171
Voted
IFIP11
15 years 4 months ago
2004
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
170
click to vote
ICETE
15 years 4 months ago
2004
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
165
click to vote
ICEB
15 years 4 months ago
2004
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
148
click to vote
BPM
15 years 8 months ago
2004 Springer
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
147
Voted
ICEB
15 years 4 months ago
2004
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
|