Sciweavers

688 search results - page 52 / 138
» Neural Business Control System
Sort
View
91
Voted
HASE
2008
IEEE
15 years 1 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
COMPUTER
2004
79views more  COMPUTER 2004»
15 years 19 days ago
Extending the Reach of Business Processes
partners are abstracted as Web services, we have introduced additional constructs to represent human users and define human interaction patterns. Each business process defined in o...
Dipanjan Chakraborty, Hui Lei
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
15 years 5 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
121
Voted
CSMR
2007
IEEE
15 years 7 months ago
A Feature-Oriented Adaptive Component Model for Dynamic Evolution
Dynamic adaptation has been an essential requirement for more and more business systems. Some research works have focused on the structural or behavioral changes of adaptive progr...
Xin Peng, Yijian Wu, Wenyun Zhao
97
Voted
CCS
2009
ACM
15 years 7 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...