Sciweavers

915 search results - page 33 / 183
» Security in Business Process Engineering
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
COMPSAC
2002
IEEE
14 years 19 days ago
On the Business Impact of Software Process Improvement
Organisations that follow the CMM-road towards software process improvement tend to spend large amounts of money and effort. This is certainly the case in the company ING which le...
Rob J. Kusters, Jos J. M. Trienekens, Wilmar Hasso...
WER
2007
Springer
14 years 1 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher
BPM
2003
Springer
121views Business» more  BPM 2003»
14 years 27 days ago
Towards a Library for Process Programming
Process programming is regarded as a critical approach in many cooperative process related areas including software engineering, workflow management, business process management, e...
Guangxin Yang
IM
2007
13 years 9 months ago
Policy-driven Business Management over Web Services
Service-oriented Architecture allows for reusable services to be composed in such a way that business tasks or activities are easily satisfied. However, currently there is a abst...
Stephen Gorton, Stephan Reiff-Marganiec