Sciweavers

209 search results - page 30 / 42
» Semantic Business Process Management: An Empirical Case Stud...
Sort
View
ESEM
2009
ACM
14 years 2 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
CSMR
1999
IEEE
13 years 11 months ago
A Software Defect Report and Tracking System in an Intranet
This paper describes a case study where SofTrack a Software Defect Report and Tracking System - was implemented using internet technology in a geographically distributed organizat...
António Silva Monteiro, Miguel Goulã...
CORR
2011
Springer
162views Education» more  CORR 2011»
12 years 11 months ago
Re-thinking Enrolment in Identity Card Schemes
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...
Ali M. Al-Khouri
KIVS
2007
Springer
14 years 1 months ago
Semantic Integration of Identity Data Repositories
Abstract. With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This ...
Christian Emig, Kim Langer, Jürgen Biermann, ...
ACMICEC
2008
ACM
276views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
A Bayesian network for IT governance performance prediction
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Mårten Simonsson, Robert Lagerström, Po...