In this paper we propose a new approach for service-oriented enterprise application integration (EAI). Unlike current EAI solutions, which mainly focus on technological aspects, ou...
Stanislav Pokraev, Dick A. C. Quartel, Maarten W. ...
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
: Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements Hamid R. Motahari-Nezhad, Sven Graupner, Sharad Singhal HP Laboratories HPL...
Hamid R. Motahari Nezhad, Sven Graupner, Sharad Si...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...