Index

[A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X]

A

abstract activities
abstraction
access
access control rules
accessibility and
accountability and
accountability and nonrepudiation
accountability and regulatory compliance
activity and execution
adaptation to new business pursuits and changes
adapted legacy application
Adapted legacy application
administration
agile enterprise

Agile enterprise architecture
  business modeling
  concepts of
  disruptive event
  electronic technology
  enhanced modeling capabilities
  enterprise business model in
  governance
    structure
  government regulation
  information technology
  Internet
  maturity level
    business perspective
  modeling technology standards
  new product line/business introduction
  opportunities for consolidation
  outsourcing
  service units
  SOA benefits and
  standards and tools
  standards-based exchange of models
  task automation
    computer role in
    workflow management systems
  technical infrastructure
  technology
    dimensions of
    modernization
  value chain
  Web services

Agile enterprise governance
  adaptations for
    capabilities and responsibilities of
  audit and risk assessment
  benefits of
    accountability and regulatory compliance
    adaptation to new business pursuits and changes
    continuous strategic planning
    design
    intelligence and empowerment
    optimization of performance and information technology
    orderly, incremental transformation
    risk management and economies of scale
  conventional strategic planning
    goals and objectives
  enterprise intelligence
    data and information
    knowledge and wisdom
  enterprise transformation
  framework
  next-generation architecture
  standards and technology
    roles of
  transformation priorities
  value network services

Agile enterprises
  and outsourcing
  concepts of
  government regulation in
  new product line/business introduction
  opportunities for consolidation
  regulatory compliance of
  SOA benefits and

Agile organization structure
  accountability
    order-processing service
    value chain
  collaborative activities and
  design principles
    enterprise optimization, requirements
  management hierarchy
    managers, role in
  organizational relationships

Agile service units
  finance and accounting
  human resource management
    continuous change and incentives
    service unit autonomy
  information technology
    executive staff support
    infrastructure management
    service unit automation
  purchasing
  value network

Agility
  benefits in business
  technology modernization in
and information technology
and outsourcing
and top management
anticipated events
application
application areas for diagnostic rules
application level
application of
as building blocks
as evidence
as shared capability
attributes2nd
audit and risk assessment
Authentication
Automated business processes
automation of
automobile market model2nd
autonomy

B

Backward chaining
batch process legacy
Batch process legacy
benefits in business
Bill order
billing for services
BPMS and
broken assumptions
broker capability
business
Business activity monitoring (BAM)
business architecture

Business architecture (BA)
  current architecture
  enterprise rules and assignments
  future value network
  gap analysis
  human resources (HR) management services
  mitigation of risks
  next-generation architecture
  responsibilities
  role authorization specifications
  service unit
    implementation
    improvements
    organization design
    support automation
  strategic architecture
  transformation
    oversight and performance assessment
    priorities
    roadmap
business benefits
business environment

Business intelligence (BI)
  operational data stores
business modeling
Business modeling and integration (BMI)
Business motivation model (BMM)
business organizations
business perspective
business process definition metamodel (BPDM)
business process execution language (BPEL)
business process management (BPM)
business process management systems (BPMS)
business process modeling systems (BPMS)
business processes

Business processes
  activity and execution
  and choreographies
    extended
    internal process
    sequence of exchange
  application areas for diagnostic rules
  automation of
  business process definition metamodel (BPDM)
  business process execution language (BPEL)
  business process management (BPM)
  business process management systems (BPMS)
  business process modeling notation (BPMN)
    capabilities and
    graphical elements
  business process modeling systems (BPMS)
  business rules and
    data integrity
    diagnostic
    enterprise
    event
    government regulations and
    management
    production rules
    qualification of
    SOA implications of
    types of
  collaboration
  concepts of
  context
  design objectives
  dynamics modeling
    application of
    automobile market model
  e-business business process (ebBP)
  expense report process
  implementation of compliance
  loose coupling
  management systems
  metadata
  modeling tools
  operating modes
    development projects
    job-shop
    product configuration
    production-line
    relay
    rule-driven
    workflow and case management
  organizational context
  outsourcing and
  process modeling
    attributes
    data object
    event and activity
    gateway and sequence flow
    group and text annotation
    message flow and association
    modeling languages
    notation
    pool and lane
  process-driven services
  roles
  simple order process
  simulation models
  SOA in
    process-driven services
    security risks in
    service unit
    transfer of value
  transformation management service unit
  with human roles
  within service units
business rules and regulations

Business-modeling
  business dynamics modeling
    automobile market model
  business processes
  business rules and regulations
  choreographies
  disruptive events and applications portfolio
  enterprise logical data model
  languages
  management dashboards
  organization structure and role-based access control
  semantics
  service unit
    cost models
    performance
    specification
  simulation
  stereotypes and tagged values
  strategic planning and electronic documents
  tactical solutions
  value chains
  vocabularies uses of and data elements

C

canonicalization algorithm
capabilities and
capabilities and responsibilities of
Capability maturity model integration (CMMI)
cardinality in
Case management in business process
Certificate authority (CA)
Certificate revocation list (CRL)
changing relationships
characteristics of2nd
choreographies

Choreography
  complementary internal process
  extended
    complex, roles in
  sequence of exchange
clustering
collaboration
Collaboration coupling and service
collaborative activities and

Commercial off-the-shelf (COTS)
  application
  software products
common model
Common object request broker architecture (CORBA)
Common warehouse metamodel (CWM)
compartmentalization
complementary internal process
complex event processing
Complex event processing (CEP)
complex, roles in
compound
computer role in
Computer-based tools in business
concepts of2nd3rd
configuration
Configuration management database (CMDB) of IT operations
consistency and
consistency and economies
consistency in
consistent data, need for
consolidation
contents in
context
continuous change and incentives
continuous strategic planning
control
Conventional business unit silos
Corporate average fuel economy (CAFE) regulations
Corporate reporting
Cost accounting
cost models
COTS application
Credit sale choreography
Critical success factors (CSFs)
current architecture
customer order in
Customer relationship management (CRM)
customers in

D

data access
data and information
data hiding
data integrity

Data modeling
  class models and
    cardinality in
  data and
    exchange
    hiding and interface
    integrity rules
    subsets and
    warehouses
  semantics
data models
data object
data replication
database
databases
degree of coupling
delivery locations
dependency network2nd
design
design objectives
Design objectives for business activities
development projects
diagnostic

Digital certificates
  exchange
  fields
digital signature
dimensions of
Discrete event simulation
disjunctive and conjunctive match
disruptive event
Disruptive events
disruptive events and applications portfolio
duration and intensity
duty separation

E

e-business business process (ebBP)
Eclipse process framework (EPF)
ecosystem
Edit order
electronic commerce
Electronic data interchange (EDI)

Electronic documents and security
  accountability and
  as evidence
  authenticity preservation
    canonicalization algorithm
  compound
  electronic notary service
  electronic signatures
    digital signature
    elements
    hash value and
  encryption and signatures
    private key
    public key and secret key
  transformation
electronic infrastructure
electronic notary service
electronic technology
elements
enhanced modeling capabilities
enterprise2nd

Enterprise application integration (EAI)
  trusted systems
enterprise applications

Enterprise business model (EBM)
  database
  master data records
  viewpoints
enterprise business model in
enterprise change
enterprise ecosystem

Enterprise information integration (EII)
  consistency and
  OMG CWM specification in
  schema and mapping

Enterprise information management (EIM)
  agile enterprise
  business models
    enterprise state and
  cross-enterprise views
    optimization
  data representation
    consistency in
    exchange and integration of
  databases
  service units
    enterprise applications
    user and
  shared knowledge
Enterprise intelligence (EI) service unit
enterprise logical data model

Enterprise logical data model (ELDM)
  common model
  industry standards
enterprise optimization, requirements
enterprise rules and assignments
Enterprise service bus (ESB)
enterprise state and
enterprise structure of
enterprise transformation
Enterprise transformation (ET)

Enterprises
  ecosystem
  rules
  transformation perspectives
  value chains
Entity-relationship (ER)
eTOM framework
eTOM Operations Level 2 Processes
eTOM strategy, infrastructure and product segment
event
event and activity

Event notification infrastructure
  publish-and-subscribe facility
  requirements
    anticipated events
    broken assumptions
  surrogate publishers, types

Event resolution business framework
  enterprise ecosystem
  executive staff
  line-of-business manager
    product life cycle for
  processes
  service unit manager
    roles of
    service interfaces
Eventcondition-action (ECA) rules

Event-driven agility
  broker capability
  event notices, sources of
    complex event processing
    external events
    internal events
    look-back
    verification and consolidation of
  event origins
    business environment
    enterprise change
    innovation
    operational categories of
  events of interest, identification of
    relevant events
    risk threshold
  rules
Event-driven architecture (EDA)
example of
exchange2nd
exchange and integration of
exchange, type of
executive staff2nd
executive staff support2nd
Expense approver role specification
expense report process
extended

eXtensible access control markup language (XACML) policies
  disjunctive and conjunctive match
  policy set structure
  target element

eXtensible markup language (XML)
  characteristics of
  customer order in
  extensible stylesheet language transformations (XSLT)
  human relations XML (HR-XML)
  schema
  XML business reporting language (XBRL)
  XML for metadata interchange (XMI), standard form of model exchange
  XML process definition language (XPDL)
  XML-signature
extensible stylesheet language transformations (XSLT)
external events
Extract transform load (ETL)

F

fields
finance and accounting
finance and accounting services
Financial services and agility
for business relationships
Forward chaining
framework
Fulfill order
functional groups
fundamental forms of
future value network

G

gap analysis
gateway and sequence flow
goals and objectives
government regulation
government regulation in
Government regulations
government regulations and
grant of authority
granularity
graphical elements
group
group and text annotation

H

hash value and
hiding and interface
hierarchy of2nd
human relations XML (HR-XML)
human resources (HR) management services

Human resources (HR) management services
  changing relationships
  incentives and alignment of organizational goals, development of
human resources (HR) services
Hyper text transport protocol (HTTP)

I

If-then/condition action rules
implementation
implementation of compliance
improvements
in organization structure
in value chain
incentives and alignment of organizational goals, development of

Industry frameworks
  data models
  example of
  processes
  rules
  service units
industry standards
Information management metamodel (IMM)
information technology

Information technology (IT) organization
  adapted legacy application
  batch process legacy
  COTS application
  executive staff support
  infrastructure management
  management
  rearchitecting
  service units support automation
  standards and technology selections
infrastructure management2nd
innovation
integration of
integrity and security
integrity rules
intelligence and empowerment
interfaces2nd
internal events
internal process
International Federation of Accountants (IFA)
Internet
Internet and
Internet Engineering Task Force (IETF)
IT application

J

Java community process (JCP)
Java Messaging Service (JMS)
job-shop
Job-shop mode in business process

K

Key performance indicators (KPIs)
knowledge and wisdom

Knowledge management
  expertise of people
    techniques in
  unstructured documents
    accessibility and
    Web search and
Knowledge-based systems

L

language for business level process modeling
languages
Legacy systems

Lightweight directory access protocol (LDAP)
  master data management and
line organizations
Line-of-business (LOB) manager
logging and alerts
Logic programming

Logical data model (LDM)
  consistent data, need for
  enterprise
  metadata
    business
    contents in
    technical
  physical
look-back
loose coupling2nd
Loose coupling

M

management2nd
management dashboards
Management dashboards
management systems
manager, role of
managers, role in
master data

Master data management
  data hiding
  integrity and security
  service unit
    granularity
  source
master data management and
master data records
maturity model2nd
message flow and association
message transformation
Message transformation

Meta object facility (MOF)
  repository product
metadata
Metadata interchange (XMI)
mitigation of risks

Model-based management (MBM)
  business organizations
  computer based
    models of enterprise
    tools
model-driven architecture

Model-driven architecture (MDA)
  modeling technology
modeling2nd
modeling languages
modeling technology
modeling technology standards
modeling tools
models
models of enterprise
modernization
monitoring and audits
Multitoken authentication

N

National Association of Securities Dealers (NASD) monitors
network of services
new product line/business introduction2nd
new/improved product
next-generation architecture2nd
notation
notification

O



Object management group (OMG)
  model-driven architecture
  standards
Obligatory
Obsolete technology
OMG CWM specification in
Open applications group, inc. (OAGi)
operational categories of
operational data stores
Operational data stores (ODS)
opportunities for consolidation2nd
optimization
optimization of performance and information technology
orderly, incremental transformation
order-processing service
Order-processing service unit
organization design
Organization for advancement of structured information standards (OASIS)
organization structure and role-based access control
organizational context
organizational dimension
organizational relationships2nd

Organizations
  aggregation factors
    consistency and economies
    degree of coupling
    outsourcing
    performance measures
    top down and bottom up
  modeling
  separation factors
    duty separation
    user independent
  structure
  transformation, levels in
outsourcing2nd3rd

Outsourcing
  risks and benefits of
outsourcing and
oversight and performance assessment
ownership

P

people qualifications
performance2nd
performance measures
physical

Platform-independent models (PIM)
  language for business level process modeling
Platform-specific models (PSM)
policy
policy from OASIS
policy set structure
pool and lane
portal
portal support
priorities
private key
process relationships
process-driven services2nd3rd
processes2nd
processes and organizations roles

Product
  configuration
  line organizations
  production rules
    rules engine
  production-line mode in business process
  value chain
product configuration
product life cycle for
product life-cycle
production rules
production-line
production-line mode in business process
Prolog statements
Proof-of-concept development
public key and secret key
Public key infrastructure (PKI)
publish-and-subscribe facility
Purchase choreography
purchasing
purchasing service units
Purchasing service units

Q

qualification of

Qualification rules
  access control rules
  people qualifications
  service policies
Query, View, Transformation (QVT)

R

Real-time expert system
rearchitecting
Registration authority (RA)
registry services
Registry services
Regulatory compliance
regulatory compliance of
relationships
relay
Relay mode in business process
relevant events
Reliable messaging
repository product
requesting and relying party
Request-response exchanges
responsibilities
Rete network
Risk management
risk management and economies of scale
risk threshold
risks and benefits of
roadmap

Robust value chain analysis (RVC)
  abstract activities
  dependency network
  hierarchy of
role authorization specifications

Role-based access control (RBAC)
  authorization requirements and subjects
    attributes
    data access
    grant of authority
    organizational relationships
    process relationships
  processes and organizations roles
  relationships
  roles, types of
  security role
  surrogate role
roles2nd
roles of2nd
roles, administration of
roles, types of
rule-driven
Rule-driven processes
rules2nd3rd
rules engine
Rules repository data model
runtime

S

Sarbanes-Oxley Act
schema
schema and mapping
security2nd
Security assertion markup language (SAML)
security concerns
security risks in
security role
Seller internal process
semantics2nd

Semantics of business vocabulary and rules (SBVR)
  specification
sequence of exchange2nd
serialization in
service distribution
service implementation
service interfaces
service performance monitoring
service policies

Service request life cycle
  delivery locations
  service distribution
  short and long
  single service operation
service unit
service unit and
service unit automation
service unit autonomy
service units2nd

Service units
  as building blocks
  as shared capability
  autonomy
  characteristics of
  collaborative relationships and
    duration and intensity
  electronic commerce
  executive staff
  finance and accounting services
  granularity
    clustering
    data replication
  group
  human resources (HR) services
  in organization structure
  in value chain
  integration of
  interfaces
  line of business
    product life-cycle
  management
    control
    service implementation
  manager, role of
  master data
  organizational dimension
  ownership
  performance
  portal
  product development
    eTOM strategy, infrastructure and product segment
    new/improved product
  production value chain
    customers in
    functional groups
  purchasing service units
  serialization in
  service-oriented value chain
  specifications of
  standards and technology
  support
  template
  transformation
    IT application
  types of
  value chain
    modeling
  value network services
  work management
service units support automation
Service-based management

Service-oriented architecture (SOA)
  billing for services
  BPMS and
  business benefits
  electronic infrastructure
  for business relationships
  maturity model
  message transformation
  portal support
  processes in
    loose coupling
    process-driven services
    security
    service unit and
    transfer of value
  registry services
  security
  service performance monitoring
  service-oriented analysis
    consolidation
    interfaces
    outsourcing
    roles
    specifications
    value chain analysis
    work management

Service-oriented architecture (SOA) security
  access control
    administration
    application level
    roles, administration of
  accountability and nonrepudiation
  and information technology
  and top management
  authorization
    access
    runtime
  business architecture
  compartmentalization
  enterprise structure of
  identification and authentication
    fundamental forms of
    requesting and relying party
  logging and alerts
  maturity model
  monitoring and audits
  network of services
  perimeter security
    Internet and
  security concerns
  single sign-on
  technology diversity
  two-way authentication
  vulnerability scanning and intrusion detection
Service-oriented enterprise
service-oriented value chain
Shared information and data (SID)
shared knowledge
Shipment choreography
short and long
simple order process
simulation
simulation models
single service operation
single sign-on
SOA benefits and2nd
SOA implications of
software products
source
specification2nd
specifications
specifications of
standards
standards and technology
standards and technology selections
standards and tools
standards-based exchange of models
stereotypes and tagged values
strategic architecture
strategic planning and electronic documents
structure2nd
subsets and
support
support automation
surrogate publishers, types
surrogate role
Systems engineering process metamodel (SPEM) from OMG

T

tactical solutions
target element
Tariffs
technical
technical infrastructure
techniques in
technology
technology diversity
technology modernization in
Telecom operations map (eTOM) from tele management forum (TMF)
Telecommunication industry and agility
Telemanagement forum (TMF)
template
Tight coupling
tools
top down and bottom up
Transaction-driven systems
transfer of value2nd
transformation
transformation management service unit
transformation perspectives
transformation priorities
transformation, levels in

Trust domains federation
  exchange, type of
trusted systems
two-way authentication
types of2nd

U

Unified modeling language (UML)
United Nations centre for trade facilitation and electronic business (UN/CEFACT)
user and
user independent

V

value chain2nd3rd

Value chain
  abstraction
  dependency network
  hierarchy of
  models
value chain analysis
value chains2nd
value network
value network services2nd
verification and consolidation of
viewpoints
vocabularies uses of and data elements
vulnerability scanning and intrusion detection

W

warehouses
Web ontology language (OWL)
Web search and
Web services

Web services (WS)
  notification
  policy
  policy from OASIS
  technology
Web services choreography definition language (WS-CDL)
with human roles
within service units
work management2nd
Work management service units
workflow and case management
workflow management systems
World Wide Web consortium (W3C)

X

XML business reporting language (XBRL)
XML for metadata interchange (XMI), standard form of model exchange
XML process definition language (XPDL)
XML-signature

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset