International Conference on Enterprise Systems最新文献

筛选
英文 中文
A Hybrid Model of Attribute Aggregation in Federated Identity Management 联邦身份管理中属性聚合的混合模型
International Conference on Enterprise Systems Pub Date : 2017-03-19 DOI: 10.1007/978-3-319-54380-2_6
M. Ferdous, F. Chowdhury, R. Poet
{"title":"A Hybrid Model of Attribute Aggregation in Federated Identity Management","authors":"M. Ferdous, F. Chowdhury, R. Poet","doi":"10.1007/978-3-319-54380-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_6","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Obfuscation and Diversification for Securing Cloud Computing 云计算安全的混淆和多样化
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_8
Shohreh Hosseinzadeh, S. Laurén, Sampsa Rauti, S. Hyrynsalmi, M. Conti, V. Leppänen
{"title":"Obfuscation and Diversification for Securing Cloud Computing","authors":"Shohreh Hosseinzadeh, S. Laurén, Sampsa Rauti, S. Hyrynsalmi, M. Conti, V. Leppänen","doi":"10.1007/978-3-319-54380-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_8","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Challenges of Cloud Forensics 云取证的挑战
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_1
H. Jahankhani, Amin Hosseinian Far
{"title":"Challenges of Cloud Forensics","authors":"H. Jahankhani, Amin Hosseinian Far","doi":"10.1007/978-3-319-54380-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_1","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Protecting Document Outside Enterprise Network: A Confirmed Framework 企业网络外文件保护:一个确定的框架
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_12
Zeyad S. Aaber, G. Wills, R. Crowder
{"title":"Protecting Document Outside Enterprise Network: A Confirmed Framework","authors":"Zeyad S. Aaber, G. Wills, R. Crowder","doi":"10.1007/978-3-319-54380-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_12","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage 使用目标-问题-度量(GQM)方法评估云存储的安全性
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_10
F. Yahya, R. Walters, G. Wills
{"title":"Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage","authors":"F. Yahya, R. Walters, G. Wills","doi":"10.1007/978-3-319-54380-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_10","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning 基于无监督学习的恶意IP流记录自动聚类
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_5
M. Umer, M. Sher
{"title":"Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning","authors":"M. Umer, M. Sher","doi":"10.1007/978-3-319-54380-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_5","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Relationship Between Public Budgeting and Risk Management: Competition or Driving? 公共预算与风险管理的关系:竞争还是驱动?
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_3
Yao-chi Lu
{"title":"The Relationship Between Public Budgeting and Risk Management: Competition or Driving?","authors":"Yao-chi Lu","doi":"10.1007/978-3-319-54380-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_3","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Organizational Cybersecurity 组织网络安全方法
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_9
Jose Romero-Mariona, Roger A. Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, J. Miguel, Lawrence Kerr, M. Major, Jorge Alvarez
{"title":"An Approach to Organizational Cybersecurity","authors":"Jose Romero-Mariona, Roger A. Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, J. Miguel, Lawrence Kerr, M. Major, Jorge Alvarez","doi":"10.1007/978-3-319-54380-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_9","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Iris Biometrics Recognition in Security Management 虹膜生物识别在安全管理中的应用
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_4
A. Ghaffari, Amin Hosseinian Far, A. S. Akbari
{"title":"Iris Biometrics Recognition in Security Management","authors":"A. Ghaffari, Amin Hosseinian Far, A. S. Akbari","doi":"10.1007/978-3-319-54380-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_4","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud 组织中的安全:迁移到云中的治理、风险和漏洞
International Conference on Enterprise Systems Pub Date : 2015-11-30 DOI: 10.1007/978-3-319-54380-2_11
M. Alassafi, R. Hussain, Ghada Ghashgari, R. Walters, G. Wills
{"title":"Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud","authors":"M. Alassafi, R. Hussain, Ghada Ghashgari, R. Walters, G. Wills","doi":"10.1007/978-3-319-54380-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-54380-2_11","url":null,"abstract":"","PeriodicalId":374156,"journal":{"name":"International Conference on Enterprise Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信