Sciweavers

2504 search results - page 14 / 501
» Enterprise Security Architecture
Sort
View
SACMAT
2003
ACM
15 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
15 years 3 months ago
Towards a Methodology for Service Construction
— All large vendors of standard business software have announced to move to service oriented architecture. They claim benefits for their customers with regard to agility and ope...
Joachim Schelp, Robert Winter
81
Voted
EDOC
2009
IEEE
15 years 23 days ago
A Goal-Oriented Requirements Modelling Language for Enterprise Architecture
Methods for enterprise architecture, such as TOGAF, acknowledge the importance of requirements engineering in the development of enterprise architectures. Modelling support is nee...
Dick A. C. Quartel, Wilco Engelsman, Henk Jonkers,...
IJACTAICIT
2010
175views more  IJACTAICIT 2010»
14 years 6 months ago
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
The basic purpose of an Enterprise Architecture project is creating integrity among different enterprise components, including processes, systems, technologies, and etc. While CMM...
Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza ...
97
Voted
SMC
2010
IEEE
151views Control Systems» more  SMC 2010»
14 years 7 months ago
A situated approach to enterprise architecture management
Abstract—Today’s enterprises are confronted with a challenging environment that demands continuous transformations. Globalized markets, disruptive technological innovations, an...
Sabine Buckl, Christian M. Schweda, Florian Matthe...