Sciweavers

2504 search results - page 67 / 501
» Enterprise Security Architecture
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 11 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
SRDS
2003
IEEE
15 years 5 months ago
Component Replication in Distributed Systems: A Case Study Using Enterprise Java Beans
A recent trend has seen the extension of objectoriented middleware to component-oriented middleware. A major advantage components offer over objects is that only the business logi...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
APSEC
2002
IEEE
15 years 4 months ago
Evaluating the Scalability of Enterprise JavaBeans Technology
One of the major problems in building large-scale distributed systems is to anticipate the performance of the eventual solution before it has been built. This problem is especiall...
Yan (Jenny) Liu, Ian Gorton, Anna Liu, Shiping Che...
CAISE
2008
Springer
15 years 1 months ago
An Electronic Market-place Centralising Exchanges in the Virtual Enterprise: a Model Proposition
In this paper, we show that Service Oriented Architectures enable exchanges to be more flexible inside the virtual enterprise (VE), because they create an electronic market-place b...
Hervé Mathieu
JUCS
2006
95views more  JUCS 2006»
14 years 11 months ago
POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
Abstract: As enterprises worldwide race to improve real-time management to improve productivity, customer services and flexibility, huge resources have been invested into enterpris...
Ping-Yu Hsu, Ping-Ho Ting