Sciweavers

1213 search results - page 199 / 243
» Enterprise information portals
Sort
View
WISEC
2010
ACM
14 years 2 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
14 years 2 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...
EUROSSC
2009
Springer
14 years 2 months ago
A Context Lifecycle for Web-Based Context Management Services
Abstract. During the development of context aware applications a context management component must traditionally be created. This task requires specialist context lifecycle managem...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
EDOC
2008
IEEE
14 years 2 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 2 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...