Sciweavers

7651 search results - page 214 / 1531
» Information integration in the enterprise
Sort
View
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
14 years 13 days ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
ISW
2009
Springer
14 years 5 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
BTW
2003
Springer
118views Database» more  BTW 2003»
14 years 3 months ago
Information System Architectures: From Art to Science
: The presentation claims that architectural design plays a crucial role in system development as a first step in a process that turns a requirements specification into a working s...
Peter C. Lockemann
IMC
2006
ACM
14 years 4 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
14 years 3 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.