Sciweavers

2376 search results - page 289 / 476
» CM - Configuration Change Management
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 4 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
CSE
2009
IEEE
14 years 4 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
ICEIS
2009
IEEE
14 years 4 months ago
Invisible Deployment of Integration Processes
Abstract. Due to the changing scope of data management towards the management of heterogeneous and distributed systems and applications, integration processes gain in importance. T...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...
ATAL
2009
Springer
14 years 4 months ago
Using relational concept knowledge to improve search in referral networks
The notion of referral networks, as presented in the work of Singh and Yolum, and their application to knowledge management, lacks two fundamental aspects; the relation of concept...
Tony White, Shawn McQuaker, Amirali Salehi-Abari
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 4 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...