Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Abstract Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A...
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
Enterprises are looking to find new and cost effective means to leverage existing investments in IT infrastructure and incorporate new capabilities in order to improve business pr...
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...