Sciweavers

5577 search results - page 1 / 1116
» E2K Technology and Implementation
Sort
View
JIKM
2002
104views more  JIKM 2002»
13 years 10 months ago
Implementing KM in an Information Technology Environment: a Practical Approach
The emergence of knowledge-based organisations has seen an emphasis shift to recognising people as the prime competitive asset and the push of management to nurture social capital...
Jayakrishnan Balachandran, Schubert Foo
SACMAT
2005
ACM
14 years 4 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li