Sciweavers

201 search results - page 36 / 41
» Business Process Reference Models: Survey and Classification
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
77
Voted
JIIS
2002
118views more  JIIS 2002»
14 years 9 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 9 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
CLEF
2010
Springer
14 years 10 months ago
DAEDALUS at ImageCLEF Wikipedia Retrieval 2010: Expanding with Semantic Information from Context
This paper describes the participation of DAEDALUS at the ImageCLEF 2010 Wikipedia Retrieval task. The main focus of our experiments is to evaluate the impact in the image retrieva...
Sara Lana-Serrano, Julio Villena-Román, Jos...
WWW
2005
ACM
15 years 10 months ago
Ranking a stream of news
According to a recent survey made by Nielsen NetRatings, searching on news articles is one of the most important activity online. Indeed, Google, Yahoo, MSN and many others have p...
Gianna M. Del Corso, Antonio Gulli, Francesco Roma...