Sciweavers

626 search results - page 68 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
IJMI
2010
149views more  IJMI 2010»
13 years 6 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
IADIS
2004
13 years 9 months ago
Business Environment Change and Service Platform Architecture Interconnection
There has been research on the areas of on-line and mobile service domains both in the business research discipline and the technology discipline. Some of the research has concent...
Kimmo Palletvuori
ITICSE
2009
ACM
14 years 2 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
CHIMIT
2009
ACM
14 years 2 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
TRUSTBUS
2007
Springer
14 years 1 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser