Sciweavers

299 search results - page 12 / 60
» Re-engineering enterprise security
Sort
View
COMPUTER
2007
72views more  COMPUTER 2007»
13 years 8 months ago
Enterprise Security for Web 2.0
Mary Ann Davidson, Elad Yoran
ESORICS
2004
Springer
14 years 1 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
COLCOM
2007
IEEE
14 years 2 months ago
Kademlia for data storage and retrieval in enterprise networks
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
Natalya Fedotova, Stefano Fanti, Luca Veltri
IAW
2003
IEEE
14 years 1 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...