Sciweavers

8767 search results - page 147 / 1754
» Enterprise Data Management
Sort
View
COMAD
2009
15 years 5 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
ETS
2002
IEEE
99views Hardware» more  ETS 2002»
15 years 4 months ago
Online Learning Technology in an SME Work-Based Setting
Over the last 20 years there has been increasing interest in work-based learning in the UK business sector as a means to improve and increase the skills of the UK workforce. The m...
Bernd Brink, John Munro, Mike Osborne
ACSAC
2009
IEEE
15 years 2 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
DSOM
2008
Springer
15 years 6 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
WISEC
2009
ACM
15 years 11 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...