Filters








102,402 Hits in 5.0 sec

Development of a public key infrastructure across multiple enterprises

B.J. Desind, T.M. Sharick, J.P. Long
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises  
It can also be difficult to de ploy a public key infrastructure among multiple enterprises when different applications and stan dards must be supported.  ...  Mainstream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it.  ...  (Vickie) Hamilton is a Senior Member of Technical Staff in the Information Systems Surety Department at Sandia National Laboratories in Development of a Public Key Infrastructure Across Multiple Enterprises  ... 
doi:10.1109/enabl.1997.630817 dblp:conf/wetice/DesindSLW97 fatcat:4cg5a4ov2zedtdwgm6z7a3ieqy

Architectural Strategies on Cloud Computing

Madhu Priya M, Ranjith Kumar Y, Shahu Chatrapati K
2012 International Journal of Advances in Computing and Information Technology  
While remotely hosted, managed services have long been a part of the IT landscape, a heightened interest in cloud computing is being fueled by ubiquitous networks, maturing standards, the rise of hardware  ...  By deploying IT infrastructure and services over the network, an organization can purchase these resources on an as-needed basis and avoid the capital costs of software and hardware.  ...  . • Shared Instance -A single database instance across a cluster that runs multiple database schemas on behalf of multiple application tenants.  ... 
doi:10.6088/ijacit.12.15003 fatcat:s6zdqmozifa3rkxat4pwvi5be4

Beyond Web services: towards on-demand complex adaptive environments

R. Cherinka, R. Miller, C. Smith
2005 IEEE International Conference on Web Services (ICWS'05)  
and initial observations on spiral development and management using Communities of Interest combined with a Developer's environment.  ...  We discuss key principles of complex systems engineering to consider, approaches to on-demand data and IT infrastructure strategy based on web service and semantic web technologies, as well as guidance  ...  in context of the whole • Implementing a common strategy across multiple stakeholders and getting everyone on a convergent path.  ... 
doi:10.1109/icws.2005.30 dblp:conf/icws/CherinkaMS05 fatcat:fdqkdf5avjbxlgjykdyrmiylle

On cloud-centric network architecture for multi-dimensional mobility

Kyu-Han Kim, Sung-Ju Lee, Paul Congdon
2012 Computer communication review  
Carmen enables the MPG to efficiently collect context from a mobile user and coordinate key system resources across the MPG and cloud.  ...  The crux of this challenge stems from the simultaneous interplay of multiple dimensions of a user's mobility-users frequently move between multiple access networks, mobile devices and unique personas.  ...  Acknowledgement Authors thank Sujata Banerjee, Jack Brassil, Ran-Fun Chiu, Puneet Sharma, David Lee, Jeongkeun Lee, and Junxing Xie for their contribution and comments on the Carmen architecture, as part of  ... 
doi:10.1145/2377677.2377776 fatcat:ml3wdgpzjngbjc3tnhucu5saku

On cloud-centric network architecture for multi-dimensional mobility

Kyu-Han Kim, Sung-Ju Lee, Paul Congdon
2012 Proceedings of the first edition of the MCC workshop on Mobile cloud computing - MCC '12  
Carmen enables the MPG to efficiently collect context from a mobile user and coordinate key system resources across the MPG and cloud.  ...  The crux of this challenge stems from the simultaneous interplay of multiple dimensions of a user's mobility-users frequently move between multiple access networks, mobile devices and unique personas.  ...  Acknowledgement Authors thank Sujata Banerjee, Jack Brassil, Ran-Fun Chiu, Puneet Sharma, David Lee, Jeongkeun Lee, and Junxing Xie for their contribution and comments on the Carmen architecture, as part of  ... 
doi:10.1145/2342509.2342511 dblp:conf/sigcomm/KimLC12 fatcat:6ns6swlyzjdsxhznbgvjden3je

IT Infrastructure for Strategic Agility

Peter Weill, Mani Subramani, Marianne Broadbent
2002 Social Science Research Network  
project with preliminary findings. £ Research Briefings: a collection of short executive summaries of key findings from research projects. £ Case Study: an in-depth description of a firm's approach to  ...  R Research Article: a completed research article drawing on one or more CISR research projects that presents management frameworks, findings and recommendations. £ Research Summary: a summary of a research  ...  Average = the average # of services of all firms studied  ... 
doi:10.2139/ssrn.317307 fatcat:alrbgkqb6ffj5mchjabpmzkehq

Development Experience of National Enterprise Architecture Framework: A Case Study

Ali AlSoufi
2014 Journal of Information Technology & Software Engineering  
hence authentication and authorization process will cut across multiple enterprises.  ...  in public sector of the Kingdom.  ... 
doi:10.4172/2165-7866.1000127 fatcat:azbrtjzxineztfwednjyfmjla4

Cold-Chain Models and Business Options

Pawanexh Kohli
2020 Figshare  
Business planners as well as policy makers need to fully understand evaluate the application of cold-chain in agribusiness.  ...  The Government's VGF scheme seems to be a worthwhile option for enterprises to take advantage of, and develop a cross regional spread of multiple pack-houses with transport.  ...  approaches (by private and public researchers) which assessed infrastructure requirements on the basis of production (supply side) alone.  ... 
doi:10.6084/m9.figshare.12318659 fatcat:azpyypfwybd43ctvqfbwvwwko4

CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment)

Jyoti Bolannavar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
As enterprises place more services in public cloud and as the public cloud providers introduce more infrastructure and platform services directly into the hands of developers, it is becoming increasingly  ...  For example, manually assessing the secure setup and configuration in cloud environments across different services, each with varying granularities of authorization policies, is extremely difficult, if  ...  rotations). • Continuous visibility into multiple public cloud environments of policy violations Developers often provision accounts and services with more permissions than necessary in the name of development  ... 
doi:10.32628/cseit206268 fatcat:tamcusngtzax7dvojydrx6lj6q

Don't Rip and Replace, Integrate!

Mahesh H. Dodani
2003 Journal of Object Technology  
These multiple security registries, such as SAP, Lotus® Notes®, AS/400, Kerberos, and Public Key Infrastructure, each have a unique method of User Identification, for example, JohnD, JDoe, or JD.  ...  Efficiency in managing storage and leveraging all storage capacity is a key requirement of enterprises today. • Operating Environment Integration: Today's e-business applications, which usually span multiple  ... 
doi:10.5381/jot.2003.2.3.c3 fatcat:fcmu45rbh5ectctbvptvm34xgy

Effective Methodologies for Enhancing Cloud Management in New Modern Enterprises

L. Aruna
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
This new model creates a brand new chance for enterprises.  ...  In this paper, some of the essential features of effective methodologies for cloud computing in the modern enterprise are briefly discussed with regard to the end-users, enterprises that use the cloud  ...  resources. storage, public cloud infrastructure is the new norm.  ... 
doi:10.23956/ijarcsse.v7i8.39 fatcat:2t4btv64t5grpij3uz2fw63czy

One Country, Three Types of CIOs: The Emergence of Technology Executives in China

Mark W. S. Chun, Kai Sung, Charla Griffy-Brown, Harvey Koeppel
2014 2014 47th Hawaii International Conference on System Sciences  
In this research, we investigated the differences in the roles and responsibilities across the CIO's job across three main regions of one country -China.  ...  In particular, we studied how CIOs of Hong Kong, mainland China, and Taiwan varied across the regions.  ...  Next, we looked for matching patterns of activities across multiple sources of data.  ... 
doi:10.1109/hicss.2014.572 dblp:conf/hicss/ChunSGK14 fatcat:hxpa36maabaxxfh3275p7n5v4y

Simplification of application operations using cloud and DevOps

Anshu Premchand, M. Sandhya, Sharmila Sankar
2019 Indonesian Journal of Electrical Engineering and Computer Science  
We use the example of a financial organization where we are currently helping in simplification of application support processes using two key levers of cloud and devops adoption to highlight the path  ...  <span>In our experience of having worked with financial institutions for over 19 calendar years, we have seen that application development, maintenance and operations teams have a very silo-ed existence  ...  Testing d) Identity and Access Management e) Public Key Infrastructure We understood that the financial organization's long term strategy was to move enterprise workloads to public cloud.  ... 
doi:10.11591/ijeecs.v13.i1.pp85-93 fatcat:ntrfru6wyveldo4f6apic55rge

Identity and Mobility in a Digital World

Ali M. Al-Khouri
2013 Technology and Investment  
Mobile identity management has attracted the attention of both the public and private sectors in the last few years.  ...  In the context of service delivery, modern mobile communication networks offer more convenient approaches to developing citizen-centric applications.  ...  the public key infrastructure set up for this purpose.  ... 
doi:10.4236/ti.2013.41002 fatcat:ea2a7ehcvjcfddzam6hjgja7f4

Implications of Integration and Interoperability for Enterprise Cloud-Based Applications [chapter]

Justice Opara-Martins, Reza Sahandi, Feng Tian
2016 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The outcome of the discussion provides a guideline applicable to support decision makers, software architects and developers when considering to design and develop interoperable applications in order to  ...  The presented work is based on a quantitative study of 114 companies, which discuss current issues and future trends of integration and interoperability requirements for enterprise cloud application adoption  ...  Service interoperability is defined as the ability of customers to use services across multiple cloud platforms through a unified management interface.  ... 
doi:10.1007/978-3-319-38904-2_22 fatcat:kmxlgkr56zc6hgmbgolla75cu4
« Previous Showing results 1 — 15 out of 102,402 results