Sciweavers

606 search results - page 48 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
JDCTA
2008
160views more  JDCTA 2008»
14 years 11 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
AINA
2008
IEEE
15 years 6 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...
CORR
2004
Springer
108views Education» more  CORR 2004»
14 years 11 months ago
Pervasive Service Architecture for a Digital Business Ecosystem
In this paper we present ideas and architectural principles upon which we are basing the development of a distributed, open-source infrastructure that, in turn, will support the ex...
Thomas Heistracher, Thomas Kurz, Claudius Masuch, ...
ECIS
2000
15 years 1 months ago
Yarra Valley Water: A Successful Change Programme for a Corporatised Water Utility
Yarra Valley Water, a corporatised water utility achieved the significant efficiencies that are promised from the move towards privatisation. At the same time it substantially imp...
J. Brudenell, Geoff A. Sandy
ISN
1998
Springer
15 years 4 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...