Sciweavers

991 search results - page 99 / 199
» Foundations for Designing Secure Architectures
Sort
View
87
Voted
BPM
2006
Springer
109views Business» more  BPM 2006»
15 years 2 months ago
A Generic Import Framework for Process Event Logs
Abstract. The application of process mining techniques to real-life corporate environments has been of an ad-hoc nature so far, focused on proving the concept. One major reason for...
Christian W. Günther, Wil M. P. van der Aalst
87
Voted
EUC
2005
Springer
15 years 3 months ago
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect...
Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Se...
92
Voted
ICSE
2008
IEEE-ACM
15 years 10 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
IEEEARES
2008
IEEE
15 years 4 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
IC
2004
14 years 11 months ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews