Sciweavers

220 search results - page 18 / 44
» Trusted business system model using context sensitiveness
Sort
View
EMISA
2006
Springer
13 years 11 months ago
Challenges and Solutions in Planning Information Systems for Networked Value Constellations
: Nowadays businesses often decide to form networked value constellations in order to satisfy complex customer needs. To fulfill the value-based requirements of an e-Business idea ...
Novica Zarvic, Maya Daneva
CIARP
2003
Springer
14 years 27 days ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
SOCO
2010
Springer
13 years 6 months ago
Visualizing and Assessing a Compositional Approach of Business Process Design
Abstract. In the context of Services Oriented Architecture (Soa), complex systems are realized through the design of business–driven processes. Since the design of a complete pro...
Sébastien Mosser, Alexandre Bergel, Mireill...
CSFW
2009
IEEE
14 years 2 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
EMISA
2005
Springer
14 years 1 months ago
An Approach to quantify the Costs of Business Process Intelligence
: Today, enterprises are forced to continuously optimize their business as well as service processes. In this context the process-centered alignment of information systems is cruci...
Bela Mutschler, Johannes Bumiller, Manfred Reicher...