Sciweavers

3452 search results - page 39 / 691
» Secure Data Outsourcing
Sort
View
COLCOM
2009
IEEE
14 years 1 months ago
Building a stateful reference monitor with coloured petri nets
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Basel Katt, Michael Hafner, Xinwen Zhang
ECIS
2003
13 years 10 months ago
Adoption trends in application service provisioning: an exploratory field study of small and medium-size enterprises
This paper describes an exploratory field study on the adoption of Application Service Provisioning (ASP) in Small and Medium-sized Enterprises (SMEs). Rooted in Merton’s Motiva...
Ryan Peterson, Alea M. Fairchild

Publication
283views
12 years 7 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
14 years 16 days ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
TCS
2008
13 years 8 months ago
Security types for dynamic web data
We describe a type system for the Xd calculus of Gardner and Maffeis. An Xd-network is a network of locations, where each location consists of both a data tree (which contains scr...
Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, J...