Sciweavers

378 search results - page 27 / 76
» Security requirement analysis of business processes
Sort
View
WSE
2002
IEEE
14 years 16 days ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
NOMS
2008
IEEE
131views Communications» more  NOMS 2008»
14 years 2 months ago
Availability "weak point" analysis over an SOA deployment framework
— Availability is one of the important factors to be considered for business-driven IT service management. This paper addresses the issue of analyzing what we call availability w...
Lei Xie, Jing Luo, Jie Qiu, John A. Pershing, Ying...
ECOWS
2006
Springer
13 years 11 months ago
A Value-Based Foundation for Service Modelling
A broader use of e-services for cross enterprise collaboration requires the services to be analysed and designed with a clear business focus. From a business perspective, the e-se...
Martin Henkel, Erik Perjons, Jelena Zdravkovic, Ch...
EDBTW
2010
Springer
14 years 22 days ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
SIGSOFT
2006
ACM
14 years 8 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu