-
1
-
-
70349118618
-
A review of the IT outsourcing literature: Insights for practice
-
Sep
-
M. C. Lacity, S. A. Khan, and L. P. Willcocks, "A review of the IT outsourcing literature: Insights for practice", The Journal of Strategic Information Systems, vol. 18, no. 3, pp. 130-146, Sep. 2009.
-
(2009)
The Journal of Strategic Information Systems
, vol.18
, Issue.3
, pp. 130-146
-
-
Lacity, M.C.1
Khan, S.A.2
Willcocks, L.P.3
-
2
-
-
34249080831
-
Service oriented architectures: Approaches, technologies and research issues
-
M. P. Papazoglou and W. Heuvel, "Service oriented architectures: approaches, technologies and research issues", The VLDB Journal, vol. 16, no. 3, pp. 389-415, 2007.
-
(2007)
The VLDB Journal
, vol.16
, Issue.3
, pp. 389-415
-
-
Papazoglou, M.P.1
Heuvel, W.2
-
4
-
-
57949088070
-
An approach to a cloud computing network
-
F. Aymerich, G. Fenu, and S. Surcis, "An approach to a Cloud Computing network", in Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on the. IEEE, 2008, pp. 113-118.
-
(2008)
Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on The. IEEE
, pp. 113-118
-
-
Aymerich, F.1
Fenu, G.2
Surcis, S.3
-
6
-
-
78649686165
-
Cloud computing a classification, business models, and research directions
-
C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk, and J. Ster, "Cloud computing a classification, business models, and research directions", Business & Information Systems Engineering, vol. 1, no. 5, pp. 391-399, 2009.
-
(2009)
Business & Information Systems Engineering
, vol.1
, Issue.5
, pp. 391-399
-
-
Weinhardt, C.1
Anandasivam, A.2
Blau, B.3
Borissov, N.4
Meinl, T.5
Michalk, W.6
Ster, J.7
-
7
-
-
80051786633
-
Compliance by design - Bridging the chasm between auditors and it architects
-
In Press, Corrected Proof
-
K. Julisch, C. Suter, T. Woitalla, and O. Zimmermann, "Compliance by design - bridging the chasm between auditors and it architects", Computers & Security, vol. In Press, Corrected Proof, 2011.
-
(2011)
Computers & Security
-
-
Julisch, K.1
Suter, C.2
Woitalla, T.3
Zimmermann, O.4
-
8
-
-
49949083649
-
A framework for native Multi-Tenancy application development and management
-
Tokyo, Japan
-
C. J. Guo, W. Sun, Y. Huang, Z. H. Wang, and B. Gao, "A framework for native Multi-Tenancy application development and management", in The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), Tokyo, Japan, 2007, pp. 551-558.
-
(2007)
The 9th IEEE International Conference on E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007)
, pp. 551-558
-
-
Guo, C.J.1
Sun, W.2
Huang, Y.3
Wang, Z.H.4
Gao, B.5
-
9
-
-
38349023889
-
Managing process customizability and customization: Model, language and process
-
A. Lazovik and H. Ludwig, "Managing process customizability and customization: Model, language and process", in IN: PROCEEDINGS OF WISE, 2007.
-
(2007)
Proceedings of WISE
-
-
Lazovik, A.1
Ludwig, H.2
-
12
-
-
84910156435
-
vTPM: Virtualizing the trusted platform module
-
Vancouver, B. C., Canada: USENIX Association
-
S. Berger, R. Cceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM: virtualizing the trusted platform module", in Proceedings of the 15th conference on USENIX Security Symposium - Volume 15. Vancouver, B. C., Canada: USENIX Association, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Berger, S.1
Cceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
14
-
-
70449490439
-
Behavioral attestation for business processes
-
Los Angeles, CA, USA
-
M. Alam, M. Nauman, X. Zhang, T. Ali, and P. C. Hung, "Behavioral attestation for business processes", in 2009 IEEE International Conference on Web Services, Los Angeles, CA, USA, 2009, pp. 343-350.
-
(2009)
2009 IEEE International Conference on Web Services
, pp. 343-350
-
-
Alam, M.1
Nauman, M.2
Zhang, X.3
Ali, T.4
Hung, P.C.5
-
15
-
-
33749064387
-
WS-Attestation: Efficient and Fine-Grained remote attestation on web services
-
IEEE Computer Society
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama, "WS-Attestation: efficient and Fine-Grained remote attestation on web services", in Proceedings of the IEEE International Conference on Web Services. IEEE Computer Society, 2005, pp. 743-750.
-
(2005)
Proceedings of the IEEE International Conference on Web Services
, pp. 743-750
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
-
16
-
-
70349248601
-
Behavioral attestation for web services (BA4WS)
-
Alexandria, Virginia, USA: ACM
-
M. Alam, X. Zhang, M. Nauman, and T. Ali, "Behavioral attestation for web services (BA4WS)", in Proceedings of the 2008 ACM workshop on Secure web services. Alexandria, Virginia, USA: ACM, 2008, pp. 21-28.
-
(2008)
Proceedings of the 2008 ACM Workshop on Secure Web Services
, pp. 21-28
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
-
17
-
-
72849129437
-
Towards BPEL in the cloud: Exploiting different delivery models for the execution of business processes
-
IEEE Computer Society
-
T. Anstett, F. Leymann, R. Mietzner, and S. Strauch, "Towards BPEL in the cloud: Exploiting different delivery models for the execution of business processes", in Proceedings of the 2009 Congress on Services - I. IEEE Computer Society, 2009, pp. 670-677.
-
(2009)
Proceedings of the 2009 Congress on Services - I
, pp. 670-677
-
-
Anstett, T.1
Leymann, F.2
Mietzner, R.3
Strauch, S.4
|