-
1
-
-
80051925358
-
-
http://www-935.ibm.com/services/us/igs/index.html. IBM Global Services.
-
IBM Global Services
-
-
-
2
-
-
80051934620
-
Improving quality of the service engagement process using a GUI-based software tool
-
Nov 17
-
James Rhodes, Tianwei Chen, Isaac Councill, Kenneth Johns, Toby Lehman, Ray Strong, Ruoyi Zhou, William Lovero. Improving Quality of the Service Engagement Process using a GUI-based Software Tool. 7th International Conference on Service Oriented Computing, Nov 17 2009.
-
(2009)
7th International Conference on Service Oriented Computing
-
-
Rhodes, J.1
Chen, T.2
Councill, I.3
Johns, K.4
Lehman, T.5
Strong, R.6
Zhou, R.7
Lovero, W.8
-
7
-
-
68249129760
-
-
Technical Report
-
Michael Armbrust and Armando Fox and Rean Griffith and Anthony D. Joseph and Randy H. Katz and Andrew Konwinski and Gunho Lee and David A. Patterson and Ariel Rabkin and Matei Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, Technical Report 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Zaharia, M.10
-
8
-
-
35549003593
-
An interorganizational knowledge-sharing security model with breach propagation detection
-
DOI 10.1007/s10796-007-9055-2
-
Daniel Soper, Haluk Dmirkan, Michael Goul. a Proactive Interorganizational Knowledge-Sharing Security Model with Breach Propagation Detection and Dynamic Policy Revision. Information Systems Frontiers Journal, Vol.9 No.5 Nov. 2007, 469-479. November 2007. (Pubitemid 350007343)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 469-479
-
-
Soper, D.S.1
Demirkan, H.2
Goul, M.3
-
12
-
-
80051920145
-
Solution spiraling: An iterative approach to outsourcing engagement cost estimation
-
Honolulu HI, October
-
Tobin J. Lehman, Gregory Eyres, Isaac Council, James Rhodes Solution Spiraling: An Iterative Approach to Outsourcing Engagement Cost Estimation,, 2009 Frontiers in Service Conference, Honolulu HI, October 2009.
-
(2009)
2009 Frontiers in Service Conference
-
-
Lehman, T.J.1
Eyres, G.2
Council, I.3
Rhodes, J.4
-
13
-
-
80051949149
-
-
Orlando FL, April
-
Tobin J. Lehman, Gregory Eyres, James Rhodes Building the Key for Unlocking the Past, INFORMS Conf on O.R. Practice, Applying Science to the Art of Business, Orlando FL, April 2010.
-
(2010)
Building the Key for Unlocking the Past, INFORMS Conf on O.R. Practice, Applying Science to the Art of Business
-
-
Lehman, T.J.1
Eyres, G.2
Rhodes, J.3
-
14
-
-
77954519818
-
-
Information Technology Laboratory, 10-7-09
-
Mell, P., Badger, L., and T. Grance. Effectively and Securely Using the Cloud Computing Paradigm. National Institute of Standards and Technology, Information Technology Laboratory, 10-7-09.
-
Effectively and Securely Using the Cloud Computing Paradigm
-
-
Mell, P.1
Badger, L.2
Grance, T.3
-
15
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing V2.1
-
(ed), December
-
Brunette, G. and R. Mogull (ed). 2009. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, December 2009.
-
(2009)
Cloud Security Alliance
-
-
Brunette, G.1
Mogull, R.2
-
16
-
-
78649281736
-
-
IBM Corporation, Form DW03004-USEN-00
-
IBM Corporation. 2009. The Benefits of Cloud Computing. Form DW03004-USEN-00.
-
(2009)
The Benefits of Cloud Computing
-
-
-
18
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. Conference on Computer and Communications Security Proceedings of the 2009 ACM workshop on Cloud computing security.
-
Conference on Computer and Communications Security Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
23
-
-
50149106838
-
Toward an optimal redundancy strategy for distributed computations
-
IEEE International Issue Date: Sept.
-
D. Szajda, B. Lawson and J. Owen. Toward an Optimal Redundancy Strategy for Distributed Computations. Cluster Computing, 2005. IEEE International Issue Date: Sept. 2005.
-
(2005)
Cluster Computing, 2005
-
-
Szajda, D.1
Lawson, B.2
Owen, J.3
-
24
-
-
84949235873
-
Secure distributed computing in a commercial environment
-
P. Syverson, editor, volume 2339 of Lecture Notes in Computer Science, Springer-Verlag
-
P. Golle and S. Stubblebine. Secure distributed computing in a commercial environment. in P. Syverson, editor, Proceedings of Financial Crypto 2001, volume 2339 of Lecture Notes in Computer Science, pages 289-304. Springer-Verlag, 2001.
-
(2001)
Proceedings of Financial Crypto 2001
, pp. 289-304
-
-
Golle, P.1
Stubblebine, S.2
|