Sciweavers

327 search results - page 23 / 66
» Transactional Service Level Agreement
Sort
View
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
JECR
2000
136views more  JECR 2000»
13 years 7 months ago
Modeling the Supply-Demand Interaction in Electronic Commerce: A Bi-Level Programming Approach
The purpose of this paper consists in establishing the model for the supply-demand interaction in the age of electronic commerce. First of all, the study uses the individual objec...
Daniel Y. Shee, Tzung-I Tang, Gwo-Hshiung Tzeng
NOMS
2000
IEEE
144views Communications» more  NOMS 2000»
13 years 12 months ago
Managing application services over service provider networks: architecture and dependency analysis
This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors’ experience with the IBM Global Network. It describes how one can e...
Gautam Kar, Alexander Keller, Seraphin B. Calo
CASCON
2008
137views Education» more  CASCON 2008»
13 years 9 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
DSS
2008
130views more  DSS 2008»
13 years 7 months ago
Knowledge representation concepts for automated SLA management
Outsourcing of complex IT infrastructure to IT service providers has increased substantially during the past years. IT service providers must be able to fulfil their service-qualit...
Adrian Paschke, Martin Bichler