Sciweavers

7651 search results - page 96 / 1531
» Information integration in the enterprise
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
JTAER
2006
100views more  JTAER 2006»
13 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
WISEC
2010
ACM
14 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
SECURWARE
2007
IEEE
14 years 3 months ago
Distributed Identity Management Model for Digital Ecosystems
— Digital Ecosystems is the new paradigm for dynamic IT business integration. A Digital Ecosystem consists of institutions that compete, collaborate, and form stable or unstable ...
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
ITNG
2006
IEEE
14 years 3 months ago
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services
Web services are key applications in business-to-business, business-to-customer, and enterprise applications integration solutions. As the mobile Internet becomes one of the main ...
Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok...