Sciweavers

77 search results - page 7 / 16
» Agile Security For Information Warfare: A Call For Research
Sort
View
ECIS
2004
13 years 8 months ago
Organizational Performance of a Firm in a Modular Business Network
The organizational capabilities to interact with others have been greatly improved as a result of modern information and communications technologies: Nowadays a company can mainta...
Diederik W. van Liere, Lorike Hagdorn van der Meij...
IEEESCC
2007
IEEE
14 years 1 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
CIKM
2009
Springer
14 years 1 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
ACMSE
2006
ACM
14 years 29 days ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ESWS
2009
Springer
14 years 1 months ago
MoKi: The Enterprise Modelling Wiki
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents aspects relevant to the activity of an ente...
Chiara Ghidini, Barbara Kump, Stefanie N. Lindstae...