Sciweavers

1422 search results - page 194 / 285
» Information security and risk management
Sort
View
NOMS
2002
IEEE
14 years 3 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...
IWAN
2000
Springer
14 years 1 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
ACMSE
2005
ACM
14 years 3 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
SACMAT
2003
ACM
14 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
CAISE
2003
Springer
14 years 3 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen