Sciweavers

1422 search results - page 130 / 285
» Information security and risk management
Sort
View
ADHOC
2005
125views more  ADHOC 2005»
13 years 10 months ago
Security considerations in ad hoc sensor networks
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. As sensor networks c...
Fei Hu, Neeraj K. Sharma
CAISE
2006
Springer
14 years 2 months ago
On the Notion of Value Object
It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of ...
Hans Weigand, Paul Johannesson, Birger Andersson, ...
WCE
2007
13 years 11 months ago
Agent-Based Perception of an Environment in an Emergency Situation
Abstract—We are interested in the problem of multiagent systems development for risk detecting and emergency response in an uncertain and partially perceived environment. The eva...
Fahem Kebair, Frédéric Serin, Cyrill...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 5 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
CAISE
2007
Springer
14 years 2 months ago
Specification and Verification of Authorization Policies for Web Services Composition
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Mohsen Rouached, Claude Godart