Sciweavers

464 search results - page 42 / 93
» Identity Management
Sort
View
BMCBI
2006
130views more  BMCBI 2006»
13 years 7 months ago
Laboratory Information Management Software for genotyping workflows: applications in high throughput crop genotyping
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...
JKM
2010
260views more  JKM 2010»
13 years 6 months ago
A scientometric analysis of knowledge management and intellectual capital academic literature (1994-2008)
Purpose – The purpose of this study is to conduct a scientometric analysis of the body of literature contained in 11 major knowledge management and intellectual capital (KM/IC) ...
Alexander Serenko, Nick Bontis, Lorne Booker, Khal...
ECOOPW
1999
Springer
13 years 12 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
CP
2010
Springer
13 years 6 months ago
An Integrated Business Rules and Constraints Approach to Data Centre Capacity Management
A recurring problem in data centres is that the constantly changing workload is not proportionally distributed over the available servers. Some resources may lay idle while others ...
Roman van der Krogt, Jacob Feldman, James Little, ...
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 28 days ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell