Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2014 International Workshop on Advanced Information Systems for Enterprises

10-12 Nov. 2014

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (904 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Message from the General Chairs and the Program Chair

    Publication Year: 2014, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee lists

    Publication Year: 2014, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • K-concealment based Distributed Anonymization for the Cloud

    Publication Year: 2014, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    There is a growing interest in cloud computing due to its various benefits such as the sharing of computing resources and the data containing personal information across multiple distributed and private databases. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. Data Economization makes data worthless to anyone except the ow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecting Access Control for Business Processes in the Cloud

    Publication Year: 2014, Page(s):8 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    Enterprise architecture (EA) aims to provide management with appropriate indicators and controls to steer and model service-oriented enterprises. Nevertheless, common enterprises architecture frameworks lack of access control mechanisms supporting security requirements within organizations. Moreover, the rapid permeation of information technology motivates new computing paradigms such as cloud com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Security Framework for Agent Based Cloud Systems

    Publication Year: 2014, Page(s):15 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    The adoption of cloud computing becomes hampered by the emergence of security problems. We aim in this paper to define a framework which clarifies the concepts of security in a cloud environment and can afterwards check a number of security properties. To achieve this objective, we propose a three-level approach: Modeling, Specification and Verification. In the first step, we propose an agent base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Queuing Model for Business Processes Elasticity Evaluation

    Publication Year: 2014, Page(s):22 - 28
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (631 KB) | HTML iconHTML

    Cloud Computing is a recent trend in information technology, it refers to a model for enabling ubiquitous, convenient, on demand network access to a shared pool of computing resources that can be rapidly provisioned and released with minimal effort. One of the characteristics of the Cloud is elasticity. Elasticity is the ability of Cloud service to rapidly change the amount of its allocated resour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic rules extraction from medical texts

    Publication Year: 2014, Page(s):29 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    The majority of existing knowledge is encoded in unstructured texts and is not linked to formalized knowledge, like ontologies and rules. The potential solution to this problem is to acquire this knowledge through natural language processing (NLP) tools and text mining techniques. Prior work has focused on the automatic extraction of ontologies from texts, but the acquired knowledge is generally l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cooperative Multi-agent Approach for Knowledge Discovery from the Enterprise Resource Planning

    Publication Year: 2014, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    In this paper, we propose a cooperative multi-agent approach for knowledge discovery from the enterprise resource planning to extract the useful knowledge, hidden in enterprise resource planning database. To achieve this, we call the paradigm of multi-agent system to enhance the knowledge discovery process. It distributes the complexity of this process on several autonomous entities called agents,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a rich and updated web services database

    Publication Year: 2014, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (881 KB) | HTML iconHTML

    Web Services Composition (WSC) is one of the main benefits of Service Oriented Architecture (SOA), however, its optimization is still a highly discussed research topic. In order to have an optimal composition, and therefore the best composite service, the composition mechanism must meet the requirements and issues of this process. Among the most important needs, we focus on the quality of web serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward an Architecture for the Semantic Integration in Enterprise Resource Planning

    Publication Year: 2014, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB) | HTML iconHTML

    Today the ERP became the cornerstone of companies' information systems. This tool allows consistent and coherent management of enterprise information system (IS). Our aim is to make the ERP interoperable with other peripheral application solutions offering more fluidity for information and with other market solutions in particular CRM (Customer Relationship Management) and SCM (Supply Chain Manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirement Engineering of a Cooperative Information System Using Viewpoints

    Publication Year: 2014, Page(s):51 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (739 KB) | HTML iconHTML

    In this paper we are interested in cooperative information systems (CIS) in inter-organizational environments. They are information systems on a large scale, which connect different organizations, often autonomous, sharing common goals, forming in this case inter-organizational system (IOS). In order to develop a CIS, we propose a VpCIs approach, which incorporates a notion of software engineering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Methodologies in Enterprise Engineering: Insights from a Workshop

    Publication Year: 2014, Page(s):58 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    The research field of Enterprise Engineering (EE) takes an engineering perspective on the design and establishment of enterprises and their supportive (information) technologies. This requires insights in a broad range of aspects, such as human, cultural, organizational and political aspects of enterprises and their underlying processes. The multidisciplinary of EE also implies the need to conside... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Modeling Tool Based on the Horus Method

    Publication Year: 2014, Page(s):65 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    A mobile modeling tool is presented, based on the theoretically founded and practically proven Horus Method for business process management. Our tool is location- and platform-independent -- therefore it can be used at different locations and on various platforms, including desktop systems, tablets and smartphones. Furthermore, our tool supports easy management of modeling business processes, beca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2014, Page(s): 72
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2014, Page(s): 74
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE