192,127 Hits in 5.3 sec

Integrating Enterprise Security Infrastructure with Cloud Computing

Oliver Pfaff, Sebastian Ries
2014 Journal of Internet Technology and Secured Transaction  
This includes corporate user repositories, authentication and authorization systems. This infrastructure backs and enables workforce productivity.  ...  Traditional enterprises have their roots in on-premises computing. They operate security infrastructure on-premise.  ...  Examples are SLO and the authentication of employee users accessing the enterprise infrastructure remotely via public network infrastructure only.  ... 
doi:10.20533/jitst.2046.3723.2014.0042 fatcat:34jiynxiyjff5mzbvmilwqs7am

An Agile Enterprise Regulation Architecture for Health Information Security Management

Ying-Pei Chen, Sung-Huai Hsieh, Po-Hsun Cheng, Tsan-Nan Chien, Heng-Shuen Chen, Jer-Junn Luh, Jin-Shin Lai, Feipei Lai, Sao-Jie Chen
2010 Telemedicine journal and e-health  
Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within  ...  Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security  ...  Especially, thanks to Chief Tzu-Hsiang Yang, and Hsiu-Chen Chung, in the Information Systems Office, NTU Hospital from 2000 to 2009. The authors are also grateful to Ronald C.  ... 
doi:10.1089/tmj.2010.0023 pmid:20815748 pmcid:PMC2956519 fatcat:k4tilgmlardaflhipuajsknryu


Florian Matthes, Christian Neubert
2011 Proceedings of the 7th International Symposium on Wikis and Open Collaboration - WikiSym '11  
Expected Benefits for the Audience  Hands-on and practical information on the use of (semantic) wikis for strategic IT management.  Experience and challenge a new enterprise wiki with an innovative approach  ...  results.  Import of and integration with existing architecturerelevant information sources (Office documents, files, databases) in the enterprise.  Open access to architectural information (file export  ...  Expected Benefits for the Audience  Hands-on and practical information on the use of (semantic) wikis for strategic IT management.  Experience and challenge a new enterprise wiki with an innovative  ... 
doi:10.1145/2038558.2038608 dblp:conf/wikis/MatthesN11 fatcat:y5eiaucybjb3vpoah575fdu2we

Looking to the Future [chapter]

Malcolm Harkins
2013 Managing Risk and Information Security  
These systems gather information about users and then analyze this information to personalize the user experience.  ...  When we have a higher level of trust, we can provide the user with greater access to sensitive enterprise information and other resources.  ... 
doi:10.1007/978-1-4302-5114-9_8 fatcat:tfi26o2el5al5fppxtj7yv5mfq

Development and Design of Investigation Platform Based on the Mobile Media

Ruonan Xing
2013 Communications and Network  
isn't beneficial to statistical analysis and survey efficiency is low, so it brings a lot of inconvenience to the enterprise.  ...  Enterprise market research is mainly tend to the traditional paper investigation and telephone interview, The traditional survey method has wasted a lot of human material and financial resources, it also  ...  Enterprise grasps the market channel information and user demand through the Internet survey, it not only save survey costs but also make a quick understanding of a thread information.  ... 
doi:10.4236/cn.2013.51b003 fatcat:y4pl5iwksbakdlxxdjzhcy5hoq

Efficient and Secure Search of Enterprise File Systems

Aameek Singh, Mudhakar Srivatsa, Ling Liu
2007 IEEE International Conference on Web Services (ICWS 2007)  
These tools treat search and access-control as two disjoint components and can result in malicious users extracting unauthorized information using the search mechanism.  ...  Finally the results (the list of files containing query keywords) are filtered based on access privileges for the querying user (access control).  ...  Definition: Access Control Aware Search (ACAS)Let ¢ ¡ £ be the information that a user ¤ can extract from filesystem ¥ by accessing it directly (dictated by access rights for ¤ ) and let  ... 
doi:10.1109/icws.2007.80 dblp:conf/icws/SinghSL07 fatcat:wo33ommfmjdx3fu7qze4xdsyje

Looking to the Future: Emerging Security Capabilities [chapter]

Malcolm W. Harkins
2016 Managing Risk and Information Security  
These systems gather information about users and then analyze this information to personalize the user experience.  ...  When we have a higher level of trust, we can provide the user with greater access to sensitive enterprise information and other resources.  ... 
doi:10.1007/978-1-4842-1455-8_8 fatcat:4n7jrdf2v5hwzfgf2etrexilcm

Enterprise Search: Tough Stuff

Rajat Mukherjee, Jianchang Mao
2004 Queue  
Enterprises must combine digital information with the knowledge and experience of employees.  ...  Whereas a public Web site gathering user information can flag privacy concerns, users in enterprises have far fewer concerns if their access-for example, clickstreams on the intranet-is tracked, because  ... 
doi:10.1145/988392.988406 fatcat:nn6ifjqepvep3ngpy4ig2cqyai

Whole Scenario of 5G Communication Access in the Digital Transformation of Medium and Large Enterprises

Yi Yang, Zhichao Yan, You Xiao, Omar Cheikhrouhou
2021 Mobile Information Systems  
the Internet service experience, and fully support IoT-aware applications.  ...  The purpose of this article is to study the full scenarios of 5G communication access in the digital transformation of medium and large enterprises.  ...  Simulation Experiment e Purpose of the Experiment. is paper analyzes the existing problems of random access in massive connection scenarios and then proposes a feedback adaptive random access strategy  ... 
doi:10.1155/2021/7322090 fatcat:4bbmse2vv5cktndmmoxn7fwhna

Fine Grained Access Control on Information Retrieval with Collaborative Fusion and Active Feedback

Fine grained access control is ensured with help of CP-ABE. Concept masking is done with CP-ABE and unmasked when user satisfies the query access right criteria.  ...  Applying three dimensions of user similarity, user-document search history and document similarity, collaborative information fusion based retrieval was proposed in that work However the work did not consider  ...  This is limiting the information access capacity of the enterprise information systems.  ... 
doi:10.35940/ijitee.j9790.0981119 fatcat:pxlb4cqbmnauhnsumljyam5bj4

Current State of Enterprise 2.0 Knowledge Management

Dimiter Velev, Plamena Zlateva
2012 International Journal of Trade, Economics and Finance  
The article aims to summarize the current and nearest in future trends in the development of knowledge management in the Enterprise 2.0 technology.  ...  A short description of the technology and its features are given.  ...  an enterprise knowledge worker may access the information at any point and from anywhere.  ... 
doi:10.7763/ijtef.2012.v3.208 fatcat:v62h7iipr5debc3aztpncwxuwa

Identity and access management: concept, challenges, solutions

2016 International Journal of Latest Trends in Engineering and Technology  
This lays the foundation for the larger GRC infrastructure for the enterprise, an area where companies such as SAP and NetIQ (and Novell before it) have combined years of experience and expertise.  ...  CHALLENGES IN IDENTITY AND ACCESS MANAGEMENT Today's enterprise IT departments face the increasingly complex challenge of providing granular access to information resources, using contextual information  ... 
doi:10.21172/1.81.039 fatcat:wla7vr4eibflxmuf2cjmwasny4

Designing the Search Service for Enterprise Portal based on Oracle Universal Content Management

K S Bauer, D Y Kuznetsov, A D Pominov
2017 Journal of Physics, Conference Series  
Enterprise Portal is an important part of an organization in informative and innovative space. The portal provides collaboration between employees and the organization.  ...  The focus is on tools for Enterprise Portal and on Search Service in particular.  ...  Enterprise Portal Enterprise Portal or the corporative portal is an automatic information system that provides interaction between employees and organization through the set of services with the access  ... 
doi:10.1088/1742-6596/803/1/012018 fatcat:lpj3lopjvjetvlzceclhm4b62y

Tools for Email Based Recommendation in Enterprise [chapter]

Michal Laclavík, Martin Šeleng, Štefan Dlugolinsky, Emil Gatial, Ladislav Hluchý
2010 Communications in Computer and Information Science  
Beset by many problems, such as spam or information overload, yet it yields significant benefits especially to enterprise users when communicating, collaborating or solving business tasks.  ...  The email standards, content, services and clients improved a lot, but the integration with the environment and enterprise context remained pretty much the same.  ...  We have also discussed experiments with the customization of the information extraction in several enterprises and organizations.  ... 
doi:10.1007/978-3-642-16402-6_23 fatcat:76laegmfxne2hkgqxscdj2hal4

Study of the Characteristic and Information Architecture Model of Enterprise Web Application

Shuang Yuan Shi, Ju Song Zhang, Zong Guo Qiu
2011 Advanced Engineering Forum  
and public web application, and the differences between enterprise web applications and desktop applications; studied the characteristics of enterprise Web applications and Information Architecture Model  ...  the client and server.  ...  Of course, they also have a lot in common; they are composed by the web page and provide information to users through the network, and require good usability and the users experience.  ... 
doi:10.4028/ fatcat:qw2pgxlyz5aczbpoh76u7balge
« Previous Showing results 1 — 15 out of 192,127 results