Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
Meta models are the core of enterprise architecture, but still few methods are available for the creation of meta models tailored for specific purposes. This paper presents two app...
This paper presents a dissertation project on business-integrated, service-oriented learning architectures. The isolation of corporate learning management from core business functi...
: In most commercial enterprises, information is scattered across a large number of (legacy) data stores. Moreover, it is nearly impossible to obtain funding to replace these data ...
The proliferation of IT and its consequent dispersion is an enterprise reality, however, most organizations do not have adequate tools and/or methodologies that enable the managem...