Sciweavers

3452 search results - page 27 / 691
» Secure Data Outsourcing
Sort
View
ERCIMDL
2010
Springer
135views Education» more  ERCIMDL 2010»
13 years 9 months ago
Automating Logical Preservation for Small Institutions with Hoppla
Preserving digital information over the long term becomes increasing important for large number of institutions. The required expertise and limited tool support discourage especial...
Stephan Strodl, Petar Petrov, Michael Greifeneder,...
JSS
2007
76views more  JSS 2007»
13 years 8 months ago
Software development risk and project performance measurement: Evidence in Korea
As more US companies outsource their software projects overseas, they find that it is more challenging to control software development risk in countries with dissimilar IT capabi...
Kwan-Sik Na, James T. Simpson, Xiaotong Li, Tushar...
CIMCA
2008
IEEE
14 years 3 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
SECURWARE
2008
IEEE
14 years 3 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
SISW
2005
IEEE
14 years 2 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman