Sciweavers

536 search results - page 58 / 108
» Embedding Information Security into the Organization
Sort
View
DIM
2005
ACM
13 years 10 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
RE
2001
Springer
14 years 15 days ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
IEEECIT
2006
IEEE
14 years 2 months ago
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project
This paper argues about the partitioning in hardware/software co-design and suggests the methodology applying extreme programming to complement the co-design. This approach, contr...
Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter...
3DPVT
2002
IEEE
172views Visualization» more  3DPVT 2002»
14 years 1 months ago
Browsing 3-D spaces with 3-D vision: body-driven navigation through the Internet city
This paper presents a computer vision stereo based interface to navigate inside a 3-D Internet city, using body gestures. A wide-baseline stereo pair of cameras is used to obtain ...
Flavia Sparacino, Christopher Richard Wren, Ali Az...
ECIS
2004
13 years 9 months ago
Network analysis of disconnect in the hollow state: the case of e-government service portals
The use of network arrangement in the development and implementation of e-government service portals is on its increase. Yet, research on network arrangement in sourcing service p...
George Kuk