Jun 11, 2010
, by
Thomas Büchner
(account disabled)
The article A Modeling Language for Describing EA Management Methods has been accepted for publication at MobIS 2010. In the article the author team (Sabine Buckl, Florian Matthes, and Christian M. Schweda) elicit requirements for a modeling language for EA management methods and assesses well-established modeling languages from bordering fields in respect to their suitability.
Jun 7, 2010
, by
Thomas Büchner
(account disabled)
The team of sebis held four presentations at workshops and co-located events of CAiSE 2010 in Hammamet, Tunisia. Sabine Buckl presented one paper at the International workshop on Business IT alignment (BUSITAL 2010, slides) and one paper at the workhsop for Ontology, Conceptualization and Epistemology for Information Systems, Software Engineering and Service Science (ONTOSE 2010, slides). Christian M. Schweda presented one paper at the International workshop on Enterprise Modeling and Simulation (EOMAS 2010, slides) and one paper at the conference on Enterprise Modeling Methods for System Analysis and Design (EMMSAD 2010, slides).
Jun 7, 2010
, by
Thomas Büchner
(account disabled)
The article Conceptual models for cross-cutting aspects in EA modeling has been accepted for publication at VORTE 2010. In the article the author team (Sabine Buckl, Florian Matthes, and Christian M. Schweda) revisit the state-of-the-art in EA conceptualization. In result, they identify four cross-cutting aspects of EA modeling. Along these aspects questions concerning a suitable alternative modeling language for EA conceptualization are discussed.
Jun 1, 2010
, by
Thomas Büchner
(account disabled)
The article A method for constructing enterprise-wide access views on business objects has been accepted for publication at Informatik 2010.
In the Article the author team (Sabine Buckl, Florian Matthes, Sascha Roth, Christopher Schulz, and Christian M. Schweda) present a method to analyze and justify an enterprise-wide access matrix. Respective viewpoints are presented facilitating a business object access management on enterprise level. The presented method and concepts are substantiated by means of a case study.