Search
Now showing items 1-5 of 5
Semantic access control for corporate mobile devices
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Issues in User Generated Content process and a proposed model to solve them
(International Journal of Technology, Knowledge and Society, 2010)
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large ...
A layered security approach for cloud computing infrastructure
(I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
A Layered Security Approach for Cloud Computing Infrastructure
(IEEE, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
Semantic Access Control for Corporate Mobile Devices
(SPRINGER-VERLAG BERLIN, 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...