|
|
|
|
LEADER |
03050nam a2200493 4500 |
001 |
978-3-030-35151-9 |
003 |
DE-He213 |
005 |
20191107151457.0 |
007 |
cr nn 008mamaa |
008 |
191106s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030351519
|9 978-3-030-35151-9
|
024 |
7 |
|
|a 10.1007/978-3-030-35151-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
4 |
|a The Practice of Enterprise Modeling
|h [electronic resource] :
|b 12th IFIP Working Conference, PoEM 2019, Luxembourg, Luxembourg, November 27-29, 2019, Proceedings /
|c edited by Jaap Gordijn, Wided Guédria, Henderik A. Proper.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XII, 243 p. 79 illus., 58 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Business Information Processing,
|x 1865-1348 ;
|v 369
|
505 |
0 |
|
|a Requirements -- Modeling and ontologies -- Reference architectures and patterns -- Methods for architectures and models -- Enterprise architecture for Security, privacy and compliance.
|
520 |
|
|
|a This volume constitutes the proceedings of the 12th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling held in November 2019 in Luxembourg, Luxembourg. The conference was created by the International Federation for Information Processing (IFIP) Working Group 8.1 to offer a forum for knowledge transfer and experience sharing between the academic and practitioner communities. The 15 full papers accepted were carefully reviewed and selected from 35 submissions. They are grouped by the following topics: modeling and ontologies; reference architectures and patterns; methods for architectures and models; and enterprise architecture for security, privacy and compliance.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
700 |
1 |
|
|a Gordijn, Jaap.
|e editor.
|0 (orcid)0000-0002-6401-3850
|1 https://orcid.org/0000-0002-6401-3850
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Guédria, Wided.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Proper, Henderik A.
|e editor.
|0 (orcid)0000-0002-7318-2496
|1 https://orcid.org/0000-0002-7318-2496
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030351502
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030351526
|
830 |
|
0 |
|a Lecture Notes in Business Information Processing,
|x 1865-1348 ;
|v 369
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-35151-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNB
|
950 |
|
|
|a Computer Science (Springer-11645)
|