Search results

Jump to: navigation, search
  • social/management sciences, (multi-)robotics, and on elements for structuring/defining/analyzing the identity and
    10 KB (1,371 words) - 16:14, 12 November 2020
  • ...tions, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on specialized domains ...s. The challenges consist of service discovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desira
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=International Symposium on Memory Management ...areas of memory management. Survey papers that present an aspect of memory management with a new coherence are also welcome.
    6 KB (967 words) - 22:51, 4 February 2009
  • * › Wireless Information Policy, Risk Assessment and Management * › Network Management and Control
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Identity management for large scale collaborative infrastructures Trust models, trust negotiation/management for collaborative systems
    4 KB (520 words) - 20:05, 14 October 2008
  • ..., eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see below). Howeve - Innovation, identity and the global village syndrome
    6 KB (780 words) - 20:06, 14 October 2008
  • * Standards or specifications for content management ...es and affiliations. Furthermore, self-references that reveal the author's identity should be avoided. Paper submission is handled electronically using the STA
    4 KB (524 words) - 23:02, 14 October 2008
  • ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management
    3 KB (369 words) - 23:08, 14 October 2008
  • ...including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to consider nove § Transactions and Workflow Management
    3 KB (305 words) - 08:44, 31 July 2020
  • ...osophy and logic, cognitive science, knowledge management, linguistics and management science are relevant areas, too. In the conference, there will be four cate ...is focused on information technologies, knowledgere presentation, process management, and new trends in these, including time-sensitive structures and communica
    8 KB (1,143 words) - 11:55, 20 June 2011
  • The security of digital exchanges and its counterpart, the management of digital identities, is the main issue concerning the concept of global s - Identity Management and New Ideas & Paradigms for the Security of Digital Identities
    4 KB (587 words) - 23:30, 14 October 2008
  • ...uting, we encourage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad ...008 invites unpublished novel contributions on all aspects of policy-based management. This year, as part of the technical program we also plan a special session
    5 KB (667 words) - 23:13, 14 October 2008
  • ...s to give thought to the identity of the profession and their own sense of identity alike. The amount of information is growing exponentially. * Information Professional and Information Management
    3 KB (490 words) - 10:33, 7 June 2020
  • ...al Issue is associated with COST 2101 Workshop on "Biometrics and Identity Management" held in Denmark in May 2008. Therefore, contributors to COST 2101 Workshop
    4 KB (526 words) - 23:17, 14 October 2008
  • -Identity Management -Security and Trust Management in P2P and Grid applications
    4 KB (487 words) - 10:42, 21 August 2020
  • * Key management in wireless/mobile environments * Identity theft and phishing in mobile networks
    2 KB (291 words) - 23:19, 14 October 2008
  • * Identity and Trust management * Digital Rights Management
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor
    4 KB (565 words) - 23:20, 14 October 2008
  • access control electronic frauds security management accounting and audit identity management smartcards
    5 KB (637 words) - 23:20, 14 October 2008
  • Mobility management and Handover Resource allocation management
    4 KB (502 words) - 23:20, 14 October 2008
  • 9) Memory management, smart caches and compiler controlled memories efforts to conceal their identity. Submissions not adhering to these
    11 KB (1,352 words) - 00:33, 15 October 2008
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management * Semantic Web-based Knowledge Management
    4 KB (573 words) - 23:31, 14 October 2008
  • * Memory management ...please provide that information to the PC chair separately. Note that the identity of the authors will be revealed to the reviewers once the review is submitt
    5 KB (678 words) - 20:58, 26 November 2016
  • ...l or distributed simulation, including synchronization, scheduling, memory management, and load balancing. ...submissions will be reviewed using a double-blind review process,i.e., the identity of authors, and referees will not be revealed to each other. To ensure blin
    3 KB (372 words) - 23:32, 14 October 2008
  • Service marketing and customer relationship management Knowledge modeling, management, and application
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Field = Management ...expanding field by focusing on issues relevant to electronic business and management. Academics and practitioners are invited to submit conceptually and empiric
    3 KB (391 words) - 23:36, 14 October 2008
  • risk management, collaborative filtering, social/business networking * Trust management, reputation management and identity management
    4 KB (499 words) - 23:42, 14 October 2008
  • * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    13 KB (1,617 words) - 19:03, 24 November 2008
  • * Distributed Access Control and Trust Management * Identity Management and Authentication
    12 KB (1,669 words) - 12:58, 18 January 2009
  • - Organisational Design and Management - Identity
    6 KB (860 words) - 13:00, 18 January 2009
  • * Mashups and federated identity * Mashups for corporate knowledge management
    6 KB (684 words) - 13:00, 18 January 2009
  • management of customers? data in Web stores can help building trust by - Trust management frameworks for secure collaborations
    5 KB (602 words) - 13:44, 23 January 2009
  • * Authentication and identity management in UE * Risk assessment, and management in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • - Identity management - Key management and authentication
    6 KB (852 words) - 13:02, 18 January 2009
  • - Digital Rights Management - Identity and Trust Management
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
    12 KB (1,690 words) - 17:08, 27 February 2009
  • ...current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this c * Identity management
    3 KB (480 words) - 17:08, 27 February 2009
  • - digital right management - transaction management
    6 KB (828 words) - 17:08, 27 February 2009
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (477 words) - 16:54, 8 August 2009
  • ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security
    6 KB (746 words) - 11:35, 2 August 2009
  • ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment; ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon
    14 KB (1,651 words) - 15:56, 15 February 2017
  • Identity Management, Security and Trust Management in P2P and Grid applications,
    3 KB (352 words) - 12:39, 11 August 2009
  • -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management
    6 KB (766 words) - 10:54, 26 April 2010
  • * Digital Rights Management * Identity and Trust management
    4 KB (484 words) - 14:20, 14 December 2009
  • - Enterprise management and consumer protection - Identity and Trust Management
    7 KB (982 words) - 19:13, 3 January 2010
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (497 words) - 03:43, 28 February 2010
  • * Formal relations: parthood, identity, connection, dependence, constitution, subsumption, instantiation * Identity and change
    4 KB (551 words) - 14:54, 27 December 2015
  • * › Knowledge Management * › e-Procurement and Web-based Supply Chain Management
    19 KB (2,462 words) - 19:10, 26 August 2010
  • - identity management, anonymity
    5 KB (701 words) - 05:52, 14 April 2011
  • Identity Management Security and Trust Management in P2P and Grid applications
    5 KB (597 words) - 10:45, 21 August 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)