19,596 research outputs found

    Patterns for service-oriented information exchange requirements

    Get PDF
    Service-Oriented Computing (SOC) is an emerging computing paradigm that supports loosely-coupled inter-enterprise interactions. SOC interactions are predominantly specified in a procedural manner that defines message sequences intermixing implementation with business requirements. In this paper we present a set of patterns concerning requirements of information exchange between participants engaging in service-oriented interactions. The patterns aim at explicating and elaborating the business requirements driving the interaction and separating them from implementation concerns

    Smart cards: State-of-the-art to future directions

    Get PDF
    The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, discussing at each step the opportunities and challenges. The paper reviews recently proposed innovative ownership/management models and the security challenges associated with them. The paper concludes with a discussion of possible future directions for the technology, and the challenges these present

    Combining goal-oriented and model-driven approaches to solve the Payment Problem Scenario

    Get PDF
    Motivated by the objective to provide an improved participation of business domain experts in the design of service-oriented integration solutions, we extend our previous work on using the COSMO methodology for service mediation by introducing a goal-oriented approach to requirements engineering. With this approach, business requirements including the motivations behind the mediation solution are better understood, specified, and aligned with their technical implementations. We use the Payment Problem Scenario of the SWS Challenge to illustrate the extension

    Encryption – use and control in E-commerce

    Get PDF
    The author describes how cryptography can be used to address modern business requirements such as identity protection, secure web access and digital signatures. Article by Robert Bond (Head of Innovation & Technology Group, Hobson Audley and Fellow of SALS). Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London

    Strategic Business Requirements for Master Data Management Systems

    Get PDF
    Master Data Management (MDM) is of increasing importance because it is seen as a promising approach in companies torespond to a number of strategic business requirements, such as complying with an increasing number of regulations,supporting internal and external business process integration, and establishing a “360-degree-view on the customer”. As aresult, software vendors such as IBM, Oracle, SAP, and TIBCO are offering MDM application systems. However, the usercommunity feels a significant mismatch between their own strategic requirements and the functionality currently offered bythe software products. As the Information Systems (IS) research community has remained silent so far regarding this researchproblem, the research presented in this paper makes intensive use of knowledge from the practitioners’ community in order todesign a framework for strategic business requirements to be met by MDM systems. As an outcome of a design-orientedresearch process, the framework is an artifact which advances the scientific body of knowledge while at the same timeproviding benefit for practitioners. The framework includes seven design principles which are translated into 23requirements. The requirements form a baseline for internal and external communication in companies and for the design ofconcrete MDM systems
    • 

    corecore