Sciweavers

7117 search results - page 137 / 1424
» IT Governance Frameworks as Methods
Sort
View
ICIW
2009
IEEE
15 years 11 months ago
Towards a Disciplined Engineering of Adaptive Service-Oriented Business Processes
Today’s cross-organizations are increasingly coordinating their capabilities in the quest of dynamically adaptable and thus highly competitive realistic services. Unfortunately,...
Nasreddine Aoumeur, Kamel Barkaoui
EUROPKI
2005
Springer
15 years 10 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
SACMAT
2003
ACM
15 years 10 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 6 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
IE
2007
15 years 6 months ago
Sam Fisher versus Immanuel Kant: the ethics of interactive media
This paper explores the notion of ethical engagement in interactive media through an examination of the Splinter Cell series of games. Keywords Interactive Media, Ethics, Stealth ...
Scott Beattie