000 | 02983nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-35151-9 | ||
003 | DE-He213 | ||
005 | 20240423125036.0 | ||
007 | cr nn 008mamaa | ||
008 | 191106s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030351519 _9978-3-030-35151-9 |
||
024 | 7 |
_a10.1007/978-3-030-35151-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 4 |
_aThe Practice of Enterprise Modeling _h[electronic resource] : _b12th IFIP Working Conference, PoEM 2019, Luxembourg, Luxembourg, November 27–29, 2019, Proceedings / _cedited by Jaap Gordijn, Wided Guédria, Henderik A. Proper. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXII, 243 p. 79 illus., 58 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Business Information Processing, _x1865-1356 ; _v369 |
|
505 | 0 | _aRequirements -- Modeling and ontologies -- Reference architectures and patterns -- Methods for architectures and models -- Enterprise architecture for Security, privacy and compliance. | |
520 | _aThis volume constitutes the proceedings of the 12th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling held in November 2019 in Luxembourg, Luxembourg. The conference was created by the International Federation for Information Processing (IFIP) Working Group 8.1 to offer a forum for knowledge transfer and experience sharing between the academic and practitioner communities. The 15 full papers accepted were carefully reviewed and selected from 35 submissions. They are grouped by the following topics: modeling and ontologies; reference architectures and patterns; methods for architectures and models; and enterprise architecture for security, privacy and compliance. | ||
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData and Information Security. |
700 | 1 |
_aGordijn, Jaap. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGuédria, Wided. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aProper, Henderik A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030351502 |
776 | 0 | 8 |
_iPrinted edition: _z9783030351526 |
830 | 0 |
_aLecture Notes in Business Information Processing, _x1865-1356 ; _v369 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-35151-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNB | ||
942 | _cSPRINGER | ||
999 |
_c173567 _d173567 |