-
3
-
-
13844271963
-
Selective and authentic third-party distribution of xml documents
-
Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., and Gupta, A. (2004). –Selective and Authentic Third-Party Distribution of XML Documents,— IEEE Transactions on Knowledge and Data Engineering, 16(10): 1263-1278.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.4
Gupta, A.5
-
5
-
-
85024085295
-
Security evaluation and management for the sap r/3 environment
-
Goodman, E. (2004). –Security Evaluation and Management for the SAP R/3 Environment,— GSEC Certification Practical.
-
(2004)
GSEC Certification Practical
-
-
Goodman, E.1
-
6
-
-
39749159243
-
Electronic data interchange and small organizations: Adoption and impact of technology
-
Iacovou, L., Benbasat, I., and Dexter, A. S. (1995). –Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,— MIS Quarterly, 19: 4, pp. 465-485.
-
(1995)
MIS Quarterly
, vol.19
, Issue.4
, pp. 465-485
-
-
Iacovou, L.1
Benbasat, I.2
Dexter, A.S.3
-
7
-
-
33750712869
-
Collaborative process patterns for e-business
-
Jayaweera, P., Johannesson, P., and Wohed, P. (2001). –Collaborative Process Patterns for e-Business,— Sig group Bulletin, 22:2.
-
(2001)
Sig Group Bulletin
, vol.22
, pp. 2
-
-
Jayaweera, P.1
Johannesson, P.2
Wohed, P.3
-
8
-
-
0242709337
-
-
SACMAT'02, June 3-4
-
Kern, A., Kuhlmann, M., Schaad, A., and Moffett, J. (2002). –Observations on the Role Life-Cycle in the Context of Enterprise Security Management,— SACMAT'02, June 3-4.
-
(2002)
Observations on the Role Life-Cycle in the Context of Enterprise Security Management
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
10
-
-
1842829347
-
-
Nagpal, A., de Bruyn, G. M., and Lyfareff, R. (1999). ALE, EDI & IDoc Technologies for SAP pp. 6-20, 376-384. Prima Publishing.
-
(1999)
ALE, EDI & Idoc Technologies for SAP
-
-
Nagpal, A.1
De Bruyn, G.M.2
Lyfareff, R.3
-
13
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). –Role-Based Access Control Models,— IEEE Comput., 29: 2.
-
(1996)
IEEE Comput.
, vol.29
, pp. 2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
84951764825
-
Enterprise resource planning - an integrative review
-
Shehab, E. M., Sharp, M. W., Supramaniam, L., and Spedding, T. A. (2004). –Enterprise resource planning - an integrative review,— Business Process Management Journal, 10:4, pp. 359-386.
-
(2004)
Business Process Management Journal
, vol.10
, Issue.4
, pp. 359-386
-
-
Shehab, E.M.1
Sharp, M.W.2
Supramaniam, L.3
Spedding, T.A.4
-
16
-
-
0001784070
-
Componentizing the enterprise application packages
-
Sprott, D. (2000). –Componentizing the Enterprise Application Packages,— Communications of the ACM, 43:4.
-
(2000)
Communications of the ACM
, vol.43
, pp. 4
-
-
Sprott, D.1
-
21
-
-
0010536362
-
Security moving from database systems to erp systems
-
van de Riet, R., Janssen, W., and de Gruijter, P. (1998). –Security Moving from Database Systems to ERP Systems.— Database and Expert Systems Applications, Proceedings, pp. 273-280, August.
-
(1998)
Database and Expert Systems Applications, Proceedings
, pp. 273-280
-
-
Van De Riet, R.1
Janssen, W.2
De Gruijter, P.3
-
26
-
-
85024066197
-
Sap exchange infrastructure 2.0
-
White Paper. (2002). SAP Exchange Infrastructure 2.0, SAP AG and Sun Microsystems.
-
(2002)
SAP AG and Sun Microsystems
-
-
|