Sciweavers

Share
IFIP
2009
Springer
8 years 8 months ago
Classifying Enterprise Architecture Analysis Approaches
Abstract. Enterprise architecture (EA) management forms a commonly accepted means to enhance the alignment of business and IT, and to support the managed evolution of the enterpris...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
IFIP
2009
Springer
8 years 8 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
IFIP
2009
Springer
8 years 8 months ago
Making PROFIT at the Intermodal Terminal - A Research Agenda
: Intermodality has been a hot topic in the logistics sector for several decades, but the expected diffusion into business is still limited. The key to increased intermodalism lies...
Torbjörn H. Netland, Ingrid Spjelkavik
IFIP
2009
Springer
8 years 8 months ago
How to Foresee and Capture the Effects of RFID Implementation
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Kristin Hergot, Lars Skjelstad
IFIP
2009
Springer
8 years 8 months ago
A Collaboration Pattern Model for Virtual Organisations
Collaboration, either inter or intra-organization is a critical business function that demands skills and knowledge spanning a wide range of domains including social, business and ...
Nikos Papageorgiou, Giannis Verginadis, Dimitris A...
IFIP
2009
Springer
8 years 8 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
IFIP
2009
Springer
8 years 8 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
IFIP
2009
Springer
8 years 8 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
books