Sciweavers

372 search results - page 19 / 75
» A Reference Model for Firewall Technology
Sort
View
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
14 years 16 days ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
AH
2006
Springer
14 years 1 months ago
Assessment of Motivation in Online Learning Environments
This research outline refers to the assessment of motivation in online learning environments. It includes a presentation of previous approaches, most of them based on Keller’s AR...
Mihaela Cocea
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
14 years 26 days ago
Aligning Strategies: Organizational, Project, Individual
Current IT literature emphasizes the importance of adopting a governance strategy based on an organization’s customer market, and inherent technology and personnel capabilities....
Rick Hefner
ICIW
2007
IEEE
13 years 7 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
CAISE
2007
Springer
14 years 1 months ago
Error Metrics for Business Process Models
Little research has been conducted so far on causes for errors in business process models. In this paper we investigate on how mainly domain independent factors such as the size or...
Jan Mendling, Gustaf Neumann