Sciweavers

1422 search results - page 177 / 285
» Information security and risk management
Sort
View
CAISE
2007
Springer
14 years 4 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
14 years 3 months ago
Spintronic memristor devices and application
—Spintronic memristor devices based upon spin torque induced magnetization motion are presented and potential application examples are given. The structure and material of these ...
Xiaobin Wang, Yiran Chen
SACMAT
2010
ACM
13 years 10 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
GCC
2003
Springer
14 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
WS
2005
ACM
14 years 3 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du