A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Enterprise Security Infrastructure with Cloud Computing
2014
Journal of Internet Technology and Secured Transaction
This includes corporate user repositories, authentication and authorization systems. This infrastructure backs and enables workforce productivity. ...
Traditional enterprises have their roots in on-premises computing. They operate security infrastructure on-premise. ...
Examples are SLO and the authentication of employee users accessing the enterprise infrastructure remotely via public network infrastructure only. ...
doi:10.20533/jitst.2046.3723.2014.0042
fatcat:34jiynxiyjff5mzbvmilwqs7am
An Agile Enterprise Regulation Architecture for Health Information Security Management
2010
Telemedicine journal and e-health
Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within ...
Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security ...
Especially, thanks to Chief Tzu-Hsiang Yang, and Hsiu-Chen Chung, in the Information Systems Office, NTU Hospital from 2000 to 2009. The authors are also grateful to Ronald C. ...
doi:10.1089/tmj.2010.0023
pmid:20815748
pmcid:PMC2956519
fatcat:k4tilgmlardaflhipuajsknryu
Wiki4EAM
2011
Proceedings of the 7th International Symposium on Wikis and Open Collaboration - WikiSym '11
Expected Benefits for the Audience Hands-on and practical information on the use of (semantic) wikis for strategic IT management. Experience and challenge a new enterprise wiki with an innovative approach ...
results. Import of and integration with existing architecturerelevant information sources (Office documents, files, databases) in the enterprise. Open access to architectural information (file export ...
Expected Benefits for the Audience
Hands-on and practical information on the use of (semantic) wikis for strategic IT management. Experience and challenge a new enterprise wiki with an innovative ...
doi:10.1145/2038558.2038608
dblp:conf/wikis/MatthesN11
fatcat:y5eiaucybjb3vpoah575fdu2we
Looking to the Future
[chapter]
2013
Managing Risk and Information Security
These systems gather information about users and then analyze this information to personalize the user experience. ...
When we have a higher level of trust, we can provide the user with greater access to sensitive enterprise information and other resources. ...
doi:10.1007/978-1-4302-5114-9_8
fatcat:tfi26o2el5al5fppxtj7yv5mfq
Development and Design of Investigation Platform Based on the Mobile Media
2013
Communications and Network
isn't beneficial to statistical analysis and survey efficiency is low, so it brings a lot of inconvenience to the enterprise. ...
Enterprise market research is mainly tend to the traditional paper investigation and telephone interview, The traditional survey method has wasted a lot of human material and financial resources, it also ...
Enterprise grasps the market channel information and user demand through the Internet survey, it not only save survey costs but also make a quick understanding of a thread information. ...
doi:10.4236/cn.2013.51b003
fatcat:y4pl5iwksbakdlxxdjzhcy5hoq
Efficient and Secure Search of Enterprise File Systems
2007
IEEE International Conference on Web Services (ICWS 2007)
These tools treat search and access-control as two disjoint components and can result in malicious users extracting unauthorized information using the search mechanism. ...
Finally the results (the list of files containing query keywords) are filtered based on access privileges for the querying user (access control). ...
Definition: Access Control Aware Search (ACAS)Let ¢ ¡ £
be the information that a user
¤
can extract from
filesystem
¥
by accessing it directly (dictated by access
rights for
¤
) and let ...
doi:10.1109/icws.2007.80
dblp:conf/icws/SinghSL07
fatcat:wo33ommfmjdx3fu7qze4xdsyje
Looking to the Future: Emerging Security Capabilities
[chapter]
2016
Managing Risk and Information Security
These systems gather information about users and then analyze this information to personalize the user experience. ...
When we have a higher level of trust, we can provide the user with greater access to sensitive enterprise information and other resources. ...
doi:10.1007/978-1-4842-1455-8_8
fatcat:4n7jrdf2v5hwzfgf2etrexilcm
Enterprise Search: Tough Stuff
2004
Queue
Enterprises must combine digital information with the knowledge and experience of employees. ...
Whereas a public Web site gathering user information can flag privacy concerns, users in enterprises have far fewer concerns if their access-for example, clickstreams on the intranet-is tracked, because ...
doi:10.1145/988392.988406
fatcat:nn6ifjqepvep3ngpy4ig2cqyai
Whole Scenario of 5G Communication Access in the Digital Transformation of Medium and Large Enterprises
2021
Mobile Information Systems
the Internet service experience, and fully support IoT-aware applications. ...
The purpose of this article is to study the full scenarios of 5G communication access in the digital transformation of medium and large enterprises. ...
Simulation Experiment
e Purpose of the Experiment. is paper analyzes the existing problems of random access in massive connection scenarios and then proposes a feedback adaptive random access strategy ...
doi:10.1155/2021/7322090
fatcat:4bbmse2vv5cktndmmoxn7fwhna
Fine Grained Access Control on Information Retrieval with Collaborative Fusion and Active Feedback
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Fine grained access control is ensured with help of CP-ABE. Concept masking is done with CP-ABE and unmasked when user satisfies the query access right criteria. ...
Applying three dimensions of user similarity, user-document search history and document similarity, collaborative information fusion based retrieval was proposed in that work However the work did not consider ...
This is limiting the information access capacity of the enterprise information systems. ...
doi:10.35940/ijitee.j9790.0981119
fatcat:pxlb4cqbmnauhnsumljyam5bj4
Current State of Enterprise 2.0 Knowledge Management
2012
International Journal of Trade, Economics and Finance
The article aims to summarize the current and nearest in future trends in the development of knowledge management in the Enterprise 2.0 technology. ...
A short description of the technology and its features are given. ...
an enterprise knowledge worker may access the information at any point and from anywhere. ...
doi:10.7763/ijtef.2012.v3.208
fatcat:v62h7iipr5debc3aztpncwxuwa
Identity and access management: concept, challenges, solutions
2016
International Journal of Latest Trends in Engineering and Technology
This lays the foundation for the larger GRC infrastructure for the enterprise, an area where companies such as SAP and NetIQ (and Novell before it) have combined years of experience and expertise. ...
CHALLENGES IN IDENTITY AND ACCESS MANAGEMENT Today's enterprise IT departments face the increasingly complex challenge of providing granular access to information resources, using contextual information ...
doi:10.21172/1.81.039
fatcat:wla7vr4eibflxmuf2cjmwasny4
Designing the Search Service for Enterprise Portal based on Oracle Universal Content Management
2017
Journal of Physics, Conference Series
Enterprise Portal is an important part of an organization in informative and innovative space. The portal provides collaboration between employees and the organization. ...
The focus is on tools for Enterprise Portal and on Search Service in particular. ...
Enterprise Portal Enterprise Portal or the corporative portal is an automatic information system that provides interaction between employees and organization through the set of services with the access ...
doi:10.1088/1742-6596/803/1/012018
fatcat:lpj3lopjvjetvlzceclhm4b62y
Tools for Email Based Recommendation in Enterprise
[chapter]
2010
Communications in Computer and Information Science
Beset by many problems, such as spam or information overload, yet it yields significant benefits especially to enterprise users when communicating, collaborating or solving business tasks. ...
The email standards, content, services and clients improved a lot, but the integration with the environment and enterprise context remained pretty much the same. ...
We have also discussed experiments with the customization of the information extraction in several enterprises and organizations. ...
doi:10.1007/978-3-642-16402-6_23
fatcat:76laegmfxne2hkgqxscdj2hal4
Study of the Characteristic and Information Architecture Model of Enterprise Web Application
2011
Advanced Engineering Forum
and public web application, and the differences between enterprise web applications and desktop applications; studied the characteristics of enterprise Web applications and Information Architecture Model ...
the client and server. ...
Of course, they also have a lot in common; they are composed by the web page and provide information to users through the network, and require good usability and the users experience. ...
doi:10.4028/www.scientific.net/aef.1.31
fatcat:qw2pgxlyz5aczbpoh76u7balge
« Previous
Showing results 1 — 15 out of 192,127 results