Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Wangler, Benkt"'
Autor:
Herrmann, Andrea, Morali, A., Etalle, Sandro, Wieringa, Roelf J., Niedrite, Laila, Strazdina, Renate, Wangler, Benkt
Publikováno v:
Workshops on Business Informatics Research (BIR 2011), 64-76
STARTPAGE=64;ENDPAGE=76;TITLE=Workshops on Business Informatics Research (BIR 2011)
Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers), 64-76
STARTPAGE=64;ENDPAGE=76;TITLE=Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers)
Workshops on Business Informatics Research ISBN: 9783642292309
BIR Workshops
STARTPAGE=64;ENDPAGE=76;TITLE=Workshops on Business Informatics Research (BIR 2011)
Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers), 64-76
STARTPAGE=64;ENDPAGE=76;TITLE=Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers)
Workshops on Business Informatics Research ISBN: 9783642292309
BIR Workshops
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but need to be able to justify their security investment
Autor:
Herrmann, Andrea, Morali, A., Etalle, Sandro, Wieringa, Roelf J., Niedrite, Laila, Strazdina, Renate, Wangler, Benkt
Publikováno v:
Perspectives in Business Informatics Research, 155-162
STARTPAGE=155;ENDPAGE=162;TITLE=Perspectives in Business Informatics Research
STARTPAGE=155;ENDPAGE=162;TITLE=Perspectives in Business Informatics Research
Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3b7f52cec48069b4129a19eacc8f4510
https://research.utwente.nl/en/publications/riskrep-riskbased-security-requirements-elicitation-and-prioritization(76cd81e3-0e51-4a94-bcf6-a31700f9ce9b).html
https://research.utwente.nl/en/publications/riskrep-riskbased-security-requirements-elicitation-and-prioritization(76cd81e3-0e51-4a94-bcf6-a31700f9ce9b).html
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Advances in Conceptual Modeling ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ & SCME Stockholm, Sweden, October 19-22, 2015, Proceedings; 2015, p26-37, 12p
Publikováno v:
Notes on Numerical Fluid Mechanics and Multidisciplinary Design ISBN: 9783319981765
CAiSE
Advanced information systems engineering: 12th international conference, CAiSE 2000, Stockholm, Sweden, June 5-9, 2000, 192-211
STARTPAGE=192;ENDPAGE=211;TITLE=Advanced information systems engineering
CAiSE
Advanced information systems engineering: 12th international conference, CAiSE 2000, Stockholm, Sweden, June 5-9, 2000, 192-211
STARTPAGE=192;ENDPAGE=211;TITLE=Advanced information systems engineering
We propose an alternative notation and semantics for process models in object analysis, to resolve problems with current diagram languages. Our dynamic life cycles are communicating state diagrams. Our life cycles support polymorphic creation, and th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d94355a725e45b4dc9b2b8be37f50b8
https://doi.org/10.1007/3-540-45140-4_14
https://doi.org/10.1007/3-540-45140-4_14
Autor:
Jarke, Matthias, Pohl, Klaus, Jacobs, Stephan, Bubenko, Janis, Assenova, Petia, Holm, Peter, Wangler, Benkt, Rolland, Colette, Plihon, Veronique, Schmitt, Jean-Roch, Sutcliffe, Alistair, Jones, Sara, Maiden, Neil, Till, David, Vassiliou, Yannis, Constantopoulos, Panos, Spanoudakis, Giorgios, Schmitt, Jean -Roch
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540572091
ESEC
ESEC
Reuse, system integration, and interoperability create a growing need for capturing, representing, and using application-level information about software-intensive systems and their evolution. In ESPRIT Basic Research Project NATURE, we are developin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cec1224900de9cde89c7ec24d6ed9e8b
https://doi.org/10.1007/3-540-57209-0_8
https://doi.org/10.1007/3-540-57209-0_8
Publikováno v:
Advances in Information Systems Development (9780387308340); 2006, p981-993, 13p
Publikováno v:
Advanced Information Systems Engineering (9783540437383); 2006, p600-611, 12p
Autor:
Embley, David W., Olivé, Antoni, Ram, Sudha, Andersson, Birger, Bergholtz, Maria, Edirisuriya, Ananda, Ilayperuma, Tharaka, Johannesson, Paul, Gordijn, Jaap, Grégoire, Bertrand, Schmitt, Michael, Dubois, Eric, Abels, Sven, Hahn, Axel, Wangler, Benkt, Weigand, Hans
Publikováno v:
Conceptual Modeling - ER 2006; 2006, p482-496, 15p
Publikováno v:
Journal of Information System Security; Jun2011, Vol. 7 Issue 2, p3-13, 11p, 4 Diagrams