Sciweavers

2614 search results - page 224 / 523
» Information System Architectures: From Art to Science
Sort
View
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 3 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
AI
2003
Springer
14 years 1 months ago
Negotiating Exchanges of Private Information for Web Service Eligibility
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Keping Jia, Bruce Spencer
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
14 years 1 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 2 months ago
Habermasian Inquiring System: Toward a General Framework for Knowledge Management Research
This study addresses a long-standing and wellrecognized problem in KM research, namely the lack of conceptual integration and a cumulative tradition. Knowledge management needs an...
Zining Guo, James Sheffield
ICSE
2007
IEEE-ACM
14 years 8 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...