Sciweavers

519 search results - page 60 / 104
» Enhancing information systems security in an academic organi...
Sort
View
PODS
2006
ACM
132views Database» more  PODS 2006»
14 years 8 months ago
Principles of dataspace systems
The most acute information management challenges today stem from organizations relying on a large number of diverse, interrelated data sources, but having no means of managing the...
Alon Y. Halevy, Michael J. Franklin, David Maier
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 8 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
CAISE
2003
Springer
14 years 1 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
COLCOM
2007
IEEE
14 years 2 months ago
Kademlia for data storage and retrieval in enterprise networks
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
Natalya Fedotova, Stefano Fanti, Luca Veltri