Sciweavers

201 search results - page 4 / 41
» Comprehensive support for management of enterprise applicati...
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
JDS
2007
104views more  JDS 2007»
13 years 7 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
ER
2003
Springer
150views Database» more  ER 2003»
14 years 29 days ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
SIGMOD
2005
ACM
169views Database» more  SIGMOD 2005»
14 years 1 months ago
Data and metadata management in service-oriented architectures: some open challenges
Over the last decade, the role of information technology in enterprises has been transforming from one of providing automation services to one of enabling business innovation. ITâ...
Vishal Sikka
EATIS
2007
ACM
13 years 11 months ago
UML and enterprise application integration in automobile industry
Information integration in enterprises is a nightmare due to the differences in software and hardware platforms and due to syntactic and semantic differences in the schemas of the...
João Ferreira, Francesco Furini, Nuno Silva