Sciweavers

700 search results - page 112 / 140
» Enterprise Computing
Sort
View
WIMOB
2009
IEEE
14 years 4 months ago
Investigating Deployment Strategies for Multi-radio Multi-channel Residential Wireless Mesh Networks
— Multi-radio multi-channel Wireless Mesh Networks (WMNs) are being increasingly deployed for broadband provision in enterprise, community, metropolitan and rural areas, due to t...
Bin Huang, Yan He, Dmitri Perkins
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
EDOC
2008
IEEE
14 years 4 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 4 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
EDOC
2007
IEEE
14 years 4 months ago
Business Process Integration by Using General Rule Markup Language
A business process usually includes multiple business partners that use systems with their business logics represented in different rule (or policy) languages. The integration of ...
Milan Milanovic, Nima Kaviani, Dragan Gasevic, Adr...