This paper presents the concept of distributed IT application in the context of knowledge society. Security requirements for data processing using very large databases are defined. Ways to optimize security for such applications are examined. Metrics for performance evaluation of security systems incorporated into distributed informatics applications are defined. The measurements are performed for the application analysis of structured text entities orthogonality
M.Sc. (Computer Science)Client/Server computing is currently one of the buzzwords in the computer in...
Rapid technological advances in recent years have precipitated a general shift towards software dist...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
The objective, necessity, means and estimated efficiency of information security cost modeling are p...
The paper presents the main characteristics of applications which are working with very large data s...
The informatics security concept is defined. For informatics applications which have a classi-cal st...
The way security mechanisms for distributed applications are engineered today has a number of seriou...
A description of architecture and approaches to the implementation of a protection system of metadat...
One important technology area in which researchers are interested is distributed systems technology....
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
The work considered the organization of security in distributed systems. The concepts of reliability...
The development of distributed IT & C applications – DIA is presented alongside their main character...
A distributed system is typically a composition of geo-dispersed resources (computing and communicat...
Millions of people all over the world are now connected to the Internet for doing business. Therefor...
This paper deals with problems of the development and security of distributed information systems. I...
M.Sc. (Computer Science)Client/Server computing is currently one of the buzzwords in the computer in...
Rapid technological advances in recent years have precipitated a general shift towards software dist...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...
The objective, necessity, means and estimated efficiency of information security cost modeling are p...
The paper presents the main characteristics of applications which are working with very large data s...
The informatics security concept is defined. For informatics applications which have a classi-cal st...
The way security mechanisms for distributed applications are engineered today has a number of seriou...
A description of architecture and approaches to the implementation of a protection system of metadat...
One important technology area in which researchers are interested is distributed systems technology....
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
The work considered the organization of security in distributed systems. The concepts of reliability...
The development of distributed IT & C applications – DIA is presented alongside their main character...
A distributed system is typically a composition of geo-dispersed resources (computing and communicat...
Millions of people all over the world are now connected to the Internet for doing business. Therefor...
This paper deals with problems of the development and security of distributed information systems. I...
M.Sc. (Computer Science)Client/Server computing is currently one of the buzzwords in the computer in...
Rapid technological advances in recent years have precipitated a general shift towards software dist...
The new millennium has brought about an increase in the use of business intelligence and knowledge m...