A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Development of a public key infrastructure across multiple enterprises
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
It can also be difficult to de ploy a public key infrastructure among multiple enterprises when different applications and stan dards must be supported. ...
Mainstream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. ...
(Vickie) Hamilton is a Senior Member of Technical Staff in the Information Systems Surety Department at Sandia National Laboratories in
Development of a Public Key Infrastructure Across Multiple Enterprises ...
doi:10.1109/enabl.1997.630817
dblp:conf/wetice/DesindSLW97
fatcat:4cg5a4ov2zedtdwgm6z7a3ieqy
Architectural Strategies on Cloud Computing
2012
International Journal of Advances in Computing and Information Technology
While remotely hosted, managed services have long been a part of the IT landscape, a heightened interest in cloud computing is being fueled by ubiquitous networks, maturing standards, the rise of hardware ...
By deploying IT infrastructure and services over the network, an organization can purchase these resources on an as-needed basis and avoid the capital costs of software and hardware. ...
. • Shared Instance -A single database instance across a cluster that runs multiple database schemas on behalf of multiple application tenants. ...
doi:10.6088/ijacit.12.15003
fatcat:s6zdqmozifa3rkxat4pwvi5be4
Beyond Web services: towards on-demand complex adaptive environments
2005
IEEE International Conference on Web Services (ICWS'05)
and initial observations on spiral development and management using Communities of Interest combined with a Developer's environment. ...
We discuss key principles of complex systems engineering to consider, approaches to on-demand data and IT infrastructure strategy based on web service and semantic web technologies, as well as guidance ...
in context of the whole • Implementing a common strategy across multiple stakeholders and getting everyone on a convergent path. ...
doi:10.1109/icws.2005.30
dblp:conf/icws/CherinkaMS05
fatcat:fdqkdf5avjbxlgjykdyrmiylle
On cloud-centric network architecture for multi-dimensional mobility
2012
Computer communication review
Carmen enables the MPG to efficiently collect context from a mobile user and coordinate key system resources across the MPG and cloud. ...
The crux of this challenge stems from the simultaneous interplay of multiple dimensions of a user's mobility-users frequently move between multiple access networks, mobile devices and unique personas. ...
Acknowledgement Authors thank Sujata Banerjee, Jack Brassil, Ran-Fun Chiu, Puneet Sharma, David Lee, Jeongkeun Lee, and Junxing Xie for their contribution and comments on the Carmen architecture, as part of ...
doi:10.1145/2377677.2377776
fatcat:ml3wdgpzjngbjc3tnhucu5saku
On cloud-centric network architecture for multi-dimensional mobility
2012
Proceedings of the first edition of the MCC workshop on Mobile cloud computing - MCC '12
Carmen enables the MPG to efficiently collect context from a mobile user and coordinate key system resources across the MPG and cloud. ...
The crux of this challenge stems from the simultaneous interplay of multiple dimensions of a user's mobility-users frequently move between multiple access networks, mobile devices and unique personas. ...
Acknowledgement Authors thank Sujata Banerjee, Jack Brassil, Ran-Fun Chiu, Puneet Sharma, David Lee, Jeongkeun Lee, and Junxing Xie for their contribution and comments on the Carmen architecture, as part of ...
doi:10.1145/2342509.2342511
dblp:conf/sigcomm/KimLC12
fatcat:6ns6swlyzjdsxhznbgvjden3je
IT Infrastructure for Strategic Agility
2002
Social Science Research Network
project with preliminary findings. £ Research Briefings: a collection of short executive summaries of key findings from research projects. £ Case Study: an in-depth description of a firm's approach to ...
R Research Article: a completed research article drawing on one or more CISR research projects that presents management frameworks, findings and recommendations. £ Research Summary: a summary of a research ...
Average = the average # of services of all firms studied ...
doi:10.2139/ssrn.317307
fatcat:alrbgkqb6ffj5mchjabpmzkehq
Development Experience of National Enterprise Architecture Framework: A Case Study
2014
Journal of Information Technology & Software Engineering
hence authentication and authorization process will cut across multiple enterprises. ...
in public sector of the Kingdom. ...
doi:10.4172/2165-7866.1000127
fatcat:azbrtjzxineztfwednjyfmjla4
Cold-Chain Models and Business Options
2020
Figshare
Business planners as well as policy makers need to fully understand evaluate the application of cold-chain in agribusiness. ...
The Government's VGF scheme seems to be a worthwhile option for enterprises to take advantage of, and develop a cross regional spread of multiple pack-houses with transport. ...
approaches (by private and public researchers) which assessed infrastructure requirements on the basis of production (supply side) alone. ...
doi:10.6084/m9.figshare.12318659
fatcat:azpyypfwybd43ctvqfbwvwwko4
CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment)
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
As enterprises place more services in public cloud and as the public cloud providers introduce more infrastructure and platform services directly into the hands of developers, it is becoming increasingly ...
For example, manually assessing the secure setup and configuration in cloud environments across different services, each with varying granularities of authorization policies, is extremely difficult, if ...
rotations). • Continuous visibility into multiple public cloud environments of policy violations Developers often provision accounts and services with more permissions than necessary in the name of development ...
doi:10.32628/cseit206268
fatcat:tamcusngtzax7dvojydrx6lj6q
Don't Rip and Replace, Integrate!
2003
Journal of Object Technology
These multiple security registries, such as SAP, Lotus® Notes®, AS/400, Kerberos, and Public Key Infrastructure, each have a unique method of User Identification, for example, JohnD, JDoe, or JD. ...
Efficiency in managing storage and leveraging all storage capacity is a key requirement of enterprises today. • Operating Environment Integration: Today's e-business applications, which usually span multiple ...
doi:10.5381/jot.2003.2.3.c3
fatcat:fcmu45rbh5ectctbvptvm34xgy
Effective Methodologies for Enhancing Cloud Management in New Modern Enterprises
2017
International Journal of Advanced Research in Computer Science and Software Engineering
This new model creates a brand new chance for enterprises. ...
In this paper, some of the essential features of effective methodologies for cloud computing in the modern enterprise are briefly discussed with regard to the end-users, enterprises that use the cloud ...
resources. storage, public cloud infrastructure is the new norm. ...
doi:10.23956/ijarcsse.v7i8.39
fatcat:2t4btv64t5grpij3uz2fw63czy
One Country, Three Types of CIOs: The Emergence of Technology Executives in China
2014
2014 47th Hawaii International Conference on System Sciences
In this research, we investigated the differences in the roles and responsibilities across the CIO's job across three main regions of one country -China. ...
In particular, we studied how CIOs of Hong Kong, mainland China, and Taiwan varied across the regions. ...
Next, we looked for matching patterns of activities across multiple sources of data. ...
doi:10.1109/hicss.2014.572
dblp:conf/hicss/ChunSGK14
fatcat:hxpa36maabaxxfh3275p7n5v4y
Simplification of application operations using cloud and DevOps
2019
Indonesian Journal of Electrical Engineering and Computer Science
We use the example of a financial organization where we are currently helping in simplification of application support processes using two key levers of cloud and devops adoption to highlight the path ...
<span>In our experience of having worked with financial institutions for over 19 calendar years, we have seen that application development, maintenance and operations teams have a very silo-ed existence ...
Testing d) Identity and Access Management e) Public Key Infrastructure We understood that the financial organization's long term strategy was to move enterprise workloads to public cloud. ...
doi:10.11591/ijeecs.v13.i1.pp85-93
fatcat:ntrfru6wyveldo4f6apic55rge
Identity and Mobility in a Digital World
2013
Technology and Investment
Mobile identity management has attracted the attention of both the public and private sectors in the last few years. ...
In the context of service delivery, modern mobile communication networks offer more convenient approaches to developing citizen-centric applications. ...
the public key infrastructure set up for this purpose. ...
doi:10.4236/ti.2013.41002
fatcat:ea2a7ehcvjcfddzam6hjgja7f4
Implications of Integration and Interoperability for Enterprise Cloud-Based Applications
[chapter]
2016
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
The outcome of the discussion provides a guideline applicable to support decision makers, software architects and developers when considering to design and develop interoperable applications in order to ...
The presented work is based on a quantitative study of 114 companies, which discuss current issues and future trends of integration and interoperability requirements for enterprise cloud application adoption ...
Service interoperability is defined as the ability of customers to use services across multiple cloud platforms through a unified management interface. ...
doi:10.1007/978-3-319-38904-2_22
fatcat:kmxlgkr56zc6hgmbgolla75cu4
« Previous
Showing results 1 — 15 out of 102,402 results