Sciweavers

915 search results - page 87 / 183
» Security in Business Process Engineering
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
WER
2001
Springer
14 years 2 months ago
Automatic Derivation of Workflow Specifications from Organizational Structures and Use Cases
Workflow technology has reached a reasonable degree of maturity, with a number of both research prototypes and commercial systems available. However, methodological issues have rec...
María del Carmen Penadés, José...
WWW
2008
ACM
14 years 10 months ago
Analysis of geographic queries in a search engine log
Geography is becoming increasingly important in web search. Search engines can often return better results to users by analyzing features such as user location or geographic terms...
Qingqing Gan, Josh Attenberg, Alexander Markowetz,...
COMPSAC
2002
IEEE
14 years 3 months ago
Renaissance: A Method to Support Software System Evolution
Legacy systems are often business critical and are associated with high maintenance costs. In this paper, we present an overview of a method, Renaissance, which aims to manage the...
Ian Warren, Jane Ransom
VLDB
2001
ACM
113views Database» more  VLDB 2001»
14 years 2 months ago
Querying XML Views of Relational Data
XML has emerged as the standard data exchange format for Internet-based business applications. This has created the need to publish existing business data, stored in relational da...
Jayavel Shanmugasundaram, Jerry Kiernan, Eugene J....