Sciweavers

378 search results - page 39 / 76
» Security requirement analysis of business processes
Sort
View
ER
2007
Springer
85views Database» more  ER 2007»
14 years 1 months ago
A Taxonomy of Customer Relationship Management Analyses for Data Warehousing
Customer Relationship Management (CRM) is a strategy that supports an organization’s decision-making process to retain long-term and profitable relationships with its customers....
Colleen Cunningham, Il-Yeol Song
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
13 years 7 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
EUROPKI
2004
Springer
14 years 1 months ago
How to Qualify Electronic Signatures and Time Stamps
Abstract. In this work we will show how non-qualified electronic signatures and time stamps can be efficiently enhanced in order to equip them with similar features as qualified ...
Detlef Hühnlein
ICWS
2004
IEEE
13 years 9 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin