Sciweavers

915 search results - page 101 / 183
» Security in Business Process Engineering
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 9 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
13 years 11 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
CORR
2011
Springer
227views Education» more  CORR 2011»
13 years 4 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...
CN
2007
148views more  CN 2007»
13 years 9 months ago
A rigorous approach to orchestrating grid services
Although conceived for web services, it is shown how BPEL (Business Process Execution Language) can be used to orchestrate a collection of grid services. This is achieved using th...
Kenneth J. Turner, Koon Leai Larry Tan
SPLC
2004
13 years 10 months ago
Software Product Family Evaluation
Abstract. This paper proposes a 4-dimensional software product family engineering evaluation framework. The four dimensions relate to the software engineering concerns of business,...
Frank van der Linden, Jan Bosch, Erik Kamsties, Ka...