Sciweavers

2560 search results - page 34 / 512
» Securing VO Management
Sort
View
IPCCC
2006
IEEE
14 years 5 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
OOPSLA
2007
Springer
14 years 5 months ago
Complexity management
Klaus Marquardt, Jens Coldewey, Lise B. Hvatum
HAIS
2008
Springer
14 years 1 days ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
CHIMIT
2007
ACM
14 years 3 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson