Sciweavers

5470 search results - page 8 / 1094
» Enterprise Information Architecture
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CAISE
2009
Springer
14 years 2 months ago
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach
Meta models are the core of enterprise architecture, but still few methods are available for the creation of meta models tailored for specific purposes. This paper presents two app...
Robert Lagerström, Jan Saat, Ulrik Franke, St...
ECTEL
2007
Springer
14 years 1 months ago
Service-oriented Knowledge Architectures - Integrating Learning and Business Information Systems
This paper presents a dissertation project on business-integrated, service-oriented learning architectures. The isolation of corporate learning management from core business functi...
Katrina Leyking
BTW
2003
Springer
93views Database» more  BTW 2003»
14 years 20 days ago
Information Integration in a Global Enterprise: Some Experiences from a Financial Services Company
: In most commercial enterprises, information is scattered across a large number of (legacy) data stores. Moreover, it is nearly impossible to obtain funding to replace these data ...
Robert Marti
SAC
2004
ACM
14 years 26 days ago
A method to define an Enterprise Architecture using the Zachman Framework
The proliferation of IT and its consequent dispersion is an enterprise reality, however, most organizations do not have adequate tools and/or methodologies that enable the managem...
Carla Marques Pereira, Pedro Sousa