Sciweavers

3149 search results - page 171 / 630
» IT security risk management
Sort
View
EUROPKI
2004
Springer
14 years 2 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ICDE
2008
IEEE
119views Database» more  ICDE 2008»
14 years 10 months ago
Toward Simulation-Based Optimization in Data Stream Management Systems
Abstract-- Our demonstration introduces a novel system architecture which massively facilitates optimization in data stream management systems (DSMS). The basic idea is to decouple...
Bernhard Seeger, Christoph Heinz, Jürgen Kr&a...
CHIMIT
2009
ACM
14 years 3 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
COMPSAC
2008
IEEE
14 years 3 months ago
Managing Libre Software Distributions under a Product Line Approach
Software product lines have already proven to be a successful methodology for building and maintaining a collection of similar software products, based on a common architecture. H...
Israel Herraiz, Gregorio Robles, Rafael Capilla, J...
ASWEC
2005
IEEE
14 years 2 months ago
Australian Software Development: What Software Project Management Practices Lead to Success?
We surveyed a number of Australian software practitioners in order to understand what software development practices were used in their recent software projects. We were particula...
June M. Verner, Narciso Cerpa