Sciweavers

177 search results - page 13 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
ICLP
2010
Springer
15 years 5 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López
ECIS
2004
15 years 3 months ago
Hungarian IT: Coping with Economic Transition and Globalisation
This paper examines the impact of economic transition on the information technology industry in Hungary. It highlights some of the challenges faced by policy makers and businesses...
G. Harindranath
113
Voted
CAISE
2005
Springer
15 years 7 months ago
Synchronizing Copies of External Data in Workflow Management Systems
Workflow management systems integrate applications and data resources in business processes. Frequently they have to keep local copies of data in the so called workflow repositor...
Johann Eder, Marek Lehmann
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 5 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
100
Voted
ESORICS
2007
Springer
15 years 8 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu