Sciweavers

141 search results - page 25 / 29
» An Approach for Enterprise Interoperability Measurement
Sort
View
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
JCP
2006
106views more  JCP 2006»
13 years 7 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JUCS
2010
162views more  JUCS 2010»
13 years 5 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
12 years 11 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
CHI
2011
ACM
12 years 11 months ago
Guess who?: enriching the social graph through a crowdsourcing game
Despite the tremendous popularity of social network sites both on the web and within enterprises, the relationship information they contain may be often incomplete or outdated. We...
Ido Guy, Adam Perer, Tal Daniel, Ohad Greenshpan, ...