Sciweavers

2270 search results - page 165 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
125
Voted
DSS
2007
86views more  DSS 2007»
15 years 3 months ago
Efficiency of critical incident management systems: Instrument development and validation
There is much literature in the area of emergency response management systems. Even so, there is in general a lacuna of literature that deals with the issue of measuring the effec...
Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J....
173
Voted
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
15 years 9 months ago
Critical Success Factors of Enterprise Resource Planning Systems Implementation Success in China
ERP implementation issues have been given much attention since two decades ago due to its low implementation success. Nearly 90 percent of ERP implementations are late or over bud...
Liang Zhang, Matthew K. O. Lee, Zhe Zhang, Probir ...
143
Voted
ICICS
2010
Springer
15 years 1 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
WSC
2007
15 years 6 months ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
133
Voted
BTW
2005
Springer
107views Database» more  BTW 2005»
15 years 9 months ago
DBMS Architecture - Still an Open Problem
More than two decades ago, DB researchers faced up to the question of how to design a data-independent database management system (DBMS), that is, a DBMS which offers an appropriat...
Theo Härder