Sciweavers

378 search results - page 53 / 76
» Security requirement analysis of business processes
Sort
View
NDSS
2003
IEEE
14 years 27 days ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
DSOM
1999
Springer
13 years 12 months ago
Integrating Service and Network Management Components for Service Fulfilment
: Solutions in the network and service management layers of telecommunications management architectures are currently fragmented both in terms of standards and products. It is ofte...
David Lewis, Chris Malbon, George Pavlou, Costas S...
WSC
1997
13 years 9 months ago
Creating a Flexible, Simulation-Based Finite Scheduling Tool
Today's business climate for manufacturers requires low inventory, quick response systems that turn out a wide variety of products. Since many companies are reaching physical...
Barbara W. Mazziotti, Richard E. Horne Jr.
BPM
2004
Springer
148views Business» more  BPM 2004»
13 years 11 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
MEDINFO
2007
155views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Towards Sustainability of Health Information Systems: How Can We Define, Measure and Achieve It?
Health information systems (HIS) in their current form are rarely sustainable. In order to sustain our health information systems and with it our health systems, we need to focus ...
Sebastian Garde, Carola M. Hullin, Rong Chen, Thil...