Sciweavers

858 search results - page 83 / 172
» BMM: A Business Modeling Method For Information Systems Deve...
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
WWW
2008
ACM
14 years 8 months ago
Enabling secure digital marketplace
The fast development of the Web provides new ways for effective distribution of network-based digital goods. A digital marketplace provides a platform to enable Web users to effec...
Hongxia Jin, Vladimir Zbarsky
ER
2007
Springer
105views Database» more  ER 2007»
14 years 2 months ago
Clarifying Goal Models
Representation and reasoning about information system (IS) requirements is facilitated with the use of goal models to describe the desired and undesired IS behaviors. One difficul...
Ivan Jureta, Stéphane Faulkner
ICDIM
2008
IEEE
14 years 2 months ago
A model driven approach to the design and implementing of fault tolerant Service oriented Architectures
One of the key stages of the development of a fault tolerant Service oriented Architecture is the creation of Diagnosers, which monitors the system’s behaviour to identify the o...
Mohammed Alodib, Behzad Bordbar, Basim Majeed
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
14 years 1 months ago
Formation of an Online Community of Practice: An Inductive Study Unearthing Key Elements
Informal conversations occur all day long among employees. These conversations allow employees to share experience such as innovative ideas for performing a task. Internalizing th...
Lori Baker-Eveleth, Suprateek Sarker, Daniel M. Ev...