Sciweavers

858 search results - page 79 / 172
» BMM: A Business Modeling Method For Information Systems Deve...
Sort
View
ACMDIS
2004
ACM
14 years 1 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
EMISA
2007
Springer
14 years 2 months ago
Viewpoint-based Meta Model Engineering
: Work systems are complex artifacts that address the concerns of a large and diverse group of stakeholders. These concerns must be reflected in the models which are created as use...
Stephan Kurpjuweit, Robert Winter
MEDES
2009
ACM
14 years 2 months ago
Integrated service engineering workbench: service engineering for digital ecosystems
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
JSW
2007
185views more  JSW 2007»
13 years 7 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
HASE
2008
IEEE
14 years 2 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani