Sciweavers

880 search results - page 42 / 176
» A Meta-Model for Enterprise Applications
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
14 years 2 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
APSEC
2000
IEEE
14 years 2 months ago
Enterprise modeling using class and instance models
Current object-oriented formalisms, such as UML, focus on describing class models and use instance models only for depicting scenarios. Little attention is being devoted to defini...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano
SACMAT
2004
ACM
14 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
AIWORC
2000
IEEE
14 years 2 months ago
A Comparison of Mobile Agent and Client-Server Paradigms for Information Retrieval Tasks in Virtual Enterprises
Abstract—In next-generation enterprises it will become increasingly important to retrieve information efficiently and rapidly from widely dispersed sites in a virtual enterprise...
Ravi Jain, Farooq Anjum, Amjad Umar