Sciweavers

715 search results - page 66 / 143
» Consistency in multi-viewpoint design of enterprise informat...
Sort
View
WISEC
2010
ACM
14 years 2 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CAISE
2008
Springer
13 years 9 months ago
Improving Data Independence, Efficiency and Functional Flexibility of Integration Platforms
The concept of Enterprise Application Integration (EAI) is widely used for integrating heterogeneous applications and systems by message-based communication. Typically, EAI servers...
Matthias Böhm, Jürgen Bittner, Dirk Habi...
DAWAK
2000
Springer
14 years 22 hour ago
Applying Vertical Fragmentation Techniques in Logical Design of Multidimensional Databases
In the context of multidimensional databases implemented on relational DBMSs through star schemes, the most effective technique to enhance performances consists of materializing re...
Matteo Golfarelli, Dario Maio, Stefano Rizzi
IJMI
2010
149views more  IJMI 2010»
13 years 6 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane