Sciweavers

371 search results - page 35 / 75
» Integrative Security Management for Web-Based Enterprise App...
Sort
View
DATE
2010
IEEE
156views Hardware» more  DATE 2010»
14 years 24 days ago
Spintronic memristor devices and application
—Spintronic memristor devices based upon spin torque induced magnetization motion are presented and potential application examples are given. The structure and material of these ...
Xiaobin Wang, Yiran Chen
IEEEARES
2010
IEEE
14 years 16 hour ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
GI
2009
Springer
13 years 5 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
BMCBI
2007
177views more  BMCBI 2007»
13 years 7 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
14 years 19 days ago
Using XML to Facilitate Information Management across Multiple Local Government Agencies
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....