Sciweavers

1700 search results - page 239 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
RULEML
2005
Springer
15 years 3 months ago
A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
Embedding Self-Management and Generic Learning Support into Courseware Structures
Traditional Computer-Aided Teaching and Learning (CAT/CAL) environments in multimedia-based teleeducation do not empower knowledge consumers (trainees, students etc.) to practice ...
Andreas Auinger, Christian Stary
ECIS
2003
14 years 11 months ago
An exploratory case study on IS implementation and organizational change in China
Owing to the turbulent and fast changing environment in which Chinese firms operate, Information Systems (IS) implementation triggers important organizational changes in these fir...
Huixian Li, John Lim, K. S. Raman