Sciweavers

736 search results - page 94 / 148
» Business process management: Where business processes and we...
Sort
View
SECURWARE
2007
IEEE
14 years 3 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
WSE
2002
IEEE
14 years 1 months ago
Migrating to the Web a Legacy Application: The Sinfor Project
Various approaches can be used to migrate legacy applications to the Web. In particular, migrating dataintensive legacy applications (e.g. traditional application for business man...
Damiano Distante, Vito Perrone, Mario A. Bochicchi...
MKWI
2008
168views Business» more  MKWI 2008»
13 years 10 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
WWW
2008
ACM
14 years 9 months ago
Extending the compatibility notion for abstract WS-BPEL processes
WS-BPEL Processes Dieter K?nig IBM B?blingen Laboratory Sch?naicher Stra?e 220, 71032 B?blingen, Germany dieterkoenig@de.ibm.com Niels Lohmann Universit?t Rostock, Institut f?r Inf...
Dieter König, Niels Lohmann, Simon Moser, Chr...
VAMOS
2008
Springer
13 years 10 months ago
A Multiple Views Model for Variability Management in Software Product Lines
With current trends towards moving variability from hardware to software, and given the increasing desire to postpone design decisions as much as is economically feasible, managin...
Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatri...