Sciweavers

8697 search results - page 58 / 1740
» An Approach to the Enterprise Integration
Sort
View
ACMSE
2006
ACM
14 years 4 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
PUK
2001
13 years 11 months ago
Scheduling in a Virtual Enterprise in the Service Sector
The work described in this paper presents an approach on scheduling in a virtual enterprise in the tourism sector. This scheduling scenario has to reconcile customers' and ser...
Florian Kandler
HICSS
2006
IEEE
170views Biometrics» more  HICSS 2006»
14 years 4 months ago
A Complex Adaptive System Perspective of Enterprise Architecture in Electronic Government
Within the public sector, the deployment of enterprise architecture is often an attempt to address the decentralization/centralization relationships to improve the links between t...
Marijn Janssen, George Kuk
SACMAT
2004
ACM
14 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
CISSE
2007
Springer
14 years 2 months ago
An MDA-Based Generic Framework to Address Various Aspects of Enterprise Architecture
- With a trend toward becoming more and more information based, enterprises constantly attempt to surpass the accomplishments of each other by improving their information activitie...
S. Shervin Ostadzadeh, Fereidoon Shams Aliee, S. A...