Sciweavers

915 search results - page 96 / 183
» Security in Business Process Engineering
Sort
View
WWW
2008
ACM
14 years 9 months ago
Using the wisdom of the crowds for keyword generation
In the sponsored search model, search engines are paid by businesses that are interested in displaying ads for their site alongside the search results. Businesses bid for keywords...
Ariel Fuxman, Panayiotis Tsaparas, Kannan Achan, R...
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
14 years 1 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
IADIS
2004
13 years 10 months ago
Institutes of intellectual property and their origins
As such important as the Industrial Revolution was to the 15th Century, the Revolution of Knowledge is transforming commercial and business relationships nowadays. The engine of t...
Cláudia Diaz Pomar, Thais Helena Bigliazzi ...
SEKE
2004
Springer
14 years 2 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
MKWI
2008
168views Business» more  MKWI 2008»
13 years 10 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis