Sciweavers

669 search results - page 12 / 134
» Managing the Risk of IT Outsourcing
Sort
View
HICSS
2003
IEEE
113views Biometrics» more  HICSS 2003»
14 years 20 days ago
Characteristics of IT Outsourcing Contracts
Once the decision to outsource an activity has been made, managers are faced with issues related to the management of the relationship with their service providers. A critical ele...
Benoit Aubert, Jean-Francois Houde, Michel Patry, ...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
STORAGESS
2005
ACM
14 years 29 days ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia