Sciweavers

2653 search results - page 429 / 531
» Business process reengineering
Sort
View
GI
2009
Springer
13 years 5 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
ESWS
2007
Springer
14 years 2 months ago
The NExT System: Towards True Dynamic Adaptations of Semantic Web Service Compositions
Traditional process support systems typically offer a static composition of atomic tasks to more powerful services. In the real world, however, processes change over time: busines...
Abraham Bernstein, Michael Dänzer
WWW
2005
ACM
14 years 8 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
WWW
2004
ACM
14 years 8 months ago
Online feedback by tests and reporting for elearning and certification programs
The evaluation of eLearning success is an indispensable business requirement of education programs: the easy registration of `visits' to eLearning websites is, however, not s...
Dirk Bade, Georg Nüssel, Gerd Wilts