Sciweavers

915 search results - page 4 / 183
» Security in Business Process Engineering
Sort
View
VRML
2000
ACM
13 years 11 months ago
3D gadgets for business process visualization - a case study
Business visualization is becoming increasingly important, since managers recognize the power of human visual intuition in information-rich decision tasks. Nevertheless, despite i...
Bastiaan Schönhage, Alex van Ballegooij, Anto...
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 3 days ago
Business Process Engineering versus E-Business Engineering - A summary of case experiences
Business process re-engineering has overcome the hype of the nineties of the last century and has become an engineering discipline. With the advent of e-business a new era of unce...
Wil Janssen, Maarten Steen, Henry M. Franken
ESEM
2009
ACM
14 years 1 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
SACMAT
2003
ACM
14 years 2 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf