Sciweavers

880 search results - page 135 / 176
» A Meta-Model for Enterprise Applications
Sort
View
111
Voted
EDOC
2008
IEEE
15 years 7 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 7 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
101
Voted
ICDE
2008
IEEE
106views Database» more  ICDE 2008»
15 years 7 months ago
DIPBench: An independent benchmark for Data-Intensive Integration Processes
— The integration of heterogeneous data sources is one of the main challenges within the area of data engineering. Due to the absence of an independent and universal benchmark fo...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...
112
Voted
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 7 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
109
Voted
ICSEA
2008
IEEE
15 years 7 months ago
Model-Driven Development of Human Tasks for Workflows
In order to increase efficiency, enterprises support their business processes by information technology (IT). The majority of business processes requires human interaction. By mea...
Stefan Link, Philip Hoyer, Thomas Schuster, Sebast...