Sciweavers

915 search results - page 90 / 183
» Security in Business Process Engineering
Sort
View
DKE
2007
82views more  DKE 2007»
13 years 10 months ago
Eliciting information for product modeling using process modeling
A product model is a formal and structured definition of product information. The most common procedure for defining a product data model is to first describe the business and/...
Ghang Lee, Charles M. Eastman, Rafael Sacks
EDBT
2006
ACM
181views Database» more  EDBT 2006»
14 years 10 months ago
TeNDaX, a Collaborative Database-Based Real-Time Editor System
TeNDaX is a collaborative database-based real-time editor system. TeNDaX is a new approach for word-processing in which documents (i.e. content and structure, tables, images etc.) ...
Klaus R. Dittrich, Michael H. Böhlen, Stefani...
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
14 years 2 days ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
ICPADS
1997
IEEE
14 years 2 months ago
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...