Sciweavers

1139 search results - page 141 / 228
» Trust Management Survey
Sort
View
CSFW
1992
IEEE
14 years 6 days ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
ADT
2006
13 years 8 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
14 years 2 months ago
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
Identifying the risks associated with the implementation of clinical information systems (CIS) in health care organizations can be a major challenge for managers, clinicians, and ...
Guy Paré, Claude Sicotte, Mirou Jaana, Davi...
ICDIM
2007
IEEE
14 years 2 months ago
The selection of CRM systems in financial institutes using the analytic hierarchy
Recently, by changing business circumstances, financial institutes have become interested in customer relationship management (CRM) in order to obtain continuous profit and to kee...
Taeho Hong, Eunmi Kim
AINA
2004
IEEE
13 years 12 months ago
RED with Optimized Dynamic Threshold Deployment on Shared Buffer
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, ...
Chengchen Hu, Bin Liu