Sciweavers

18 search results - page 3 / 4
» Regulatory Information Management and Compliance Assistance
Sort
View
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
12 years 10 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
BCS
2008
13 years 9 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
JTAER
2006
100views more  JTAER 2006»
13 years 7 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
14 years 1 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter