Sciweavers

2653 search results - page 464 / 531
» Business process reengineering
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ACSAC
2005
IEEE
14 years 1 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
APSEC
2005
IEEE
14 years 1 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
EEE
2005
IEEE
14 years 1 months ago
Predicting the Survival or Failure of Click-and-Mortar Corporations
With the boom in e-business, several corporations have emerged in the late nineties that have primarily conducted their business through the Internet and the Web. They have come t...
Indranil Bose, Raktim Pal
EUROMICRO
2005
IEEE
14 years 1 months ago
Naked Objects versus Traditional Mobile Platform Development: A Comparative Case Study
It has been suggested that use of the Naked Objects pattern could contribute to business agility of applications and reduce the amount of the application code up to 75 percent in ...
Heikki Keränen, Pekka Abrahamsson