Sciweavers

577 search results - page 97 / 116
» An enterprise assurance framework
Sort
View
DSN
2005
IEEE
14 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
CDVE
2005
Springer
245views Visualization» more  CDVE 2005»
14 years 3 months ago
Collaborative Solution for Cooperation, Coordination and Knowledge Management in the Ceramic Tile Design Chain
This paper presents a solution for cooperation between companies that belong to a supply chain in the ceramic tile sector, where competitiveness requires constant innovation in pro...
Carlos Vila, Fernando Romero, Vanesa Galmés...
ICSOC
2005
Springer
14 years 3 months ago
Service Oriented Architectures for Science Gateways on Grid Systems
Grid computing is about allocating distributed collections of resources including computers, storage systems, networks and instruments to form a coherent system devoted to a “vir...
Dennis Gannon, Beth Plale, Marcus Christie, Liang ...
ITRUST
2005
Springer
14 years 3 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
BPM
2004
Springer
114views Business» more  BPM 2004»
14 years 3 months ago
Modeling Medical E-services
On the one hand Web services are gaining increasing attention. A lot of standardization has improved their stability and range of application. Composition and coordination techniqu...
Rainer Anzböck, Schahram Dustdar