[A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X]
abstract activities
abstraction
access
access control rules
accessibility and
accountability and
accountability and nonrepudiation
accountability and regulatory compliance
activity and execution
adaptation to new business pursuits and changes
adapted legacy application
Adapted legacy application
administration
agile enterprise
Agile enterprise architecture
business modeling
concepts of
disruptive event
electronic technology
enhanced modeling capabilities
enterprise business model in
governance
structure
government regulation
information technology
Internet
maturity level
business perspective
modeling technology standards
new product line/business introduction
opportunities for consolidation
outsourcing
service units
SOA benefits and
standards and tools
standards-based exchange of models
task automation
computer role in
workflow management systems
technical infrastructure
technology
dimensions of
modernization
value chain
Web services
Agile enterprise governance
adaptations for
capabilities and responsibilities of
audit and risk assessment
benefits of
accountability and regulatory compliance
adaptation to new business pursuits and changes
continuous strategic planning
design
intelligence and empowerment
optimization of performance and information technology
orderly, incremental transformation
risk management and economies of scale
conventional strategic planning
goals and objectives
enterprise intelligence
data and information
knowledge and wisdom
enterprise transformation
framework
next-generation architecture
standards and technology
roles of
transformation priorities
value network services
Agile enterprises
and outsourcing
concepts of
government regulation in
new product line/business introduction
opportunities for consolidation
regulatory compliance of
SOA benefits and
Agile organization structure
accountability
order-processing service
value chain
collaborative activities and
design principles
enterprise optimization, requirements
management hierarchy
managers, role in
organizational relationships
Agile service units
finance and accounting
human resource management
continuous change and incentives
service unit autonomy
information technology
executive staff support
infrastructure management
service unit automation
purchasing
value network
Agility
benefits in business
technology modernization in
and information technology
and outsourcing
and top management
anticipated events
application
application areas for diagnostic rules
application level
application of
as building blocks
as evidence
as shared capability
attributes, 2nd
audit and risk assessment
Authentication
Automated business processes
automation of
automobile market model, 2nd
autonomy
Backward chaining
batch process legacy
Batch process legacy
benefits in business
Bill order
billing for services
BPMS and
broken assumptions
broker capability
business
Business activity monitoring (BAM)
business architecture
Business architecture (BA)
current architecture
enterprise rules and assignments
future value network
gap analysis
human resources (HR) management services
mitigation of risks
next-generation architecture
responsibilities
role authorization specifications
service unit
implementation
improvements
organization design
support automation
strategic architecture
transformation
oversight and performance assessment
priorities
roadmap
business benefits
business environment
Business intelligence (BI)
operational data stores
business modeling
Business modeling and integration (BMI)
Business motivation model (BMM)
business organizations
business perspective
business process definition metamodel (BPDM)
business process execution language (BPEL)
business process management (BPM)
business process management systems (BPMS)
business process modeling systems (BPMS)
business processes
Business processes
activity and execution
and choreographies
extended
internal process
sequence of exchange
application areas for diagnostic rules
automation of
business process definition metamodel (BPDM)
business process execution language (BPEL)
business process management (BPM)
business process management systems (BPMS)
business process modeling notation (BPMN)
capabilities and
graphical elements
business process modeling systems (BPMS)
business rules and
data integrity
diagnostic
enterprise
event
government regulations and
management
production rules
qualification of
SOA implications of
types of
collaboration
concepts of
context
design objectives
dynamics modeling
application of
automobile market model
e-business business process (ebBP)
expense report process
implementation of compliance
loose coupling
management systems
metadata
modeling tools
operating modes
development projects
job-shop
product configuration
production-line
relay
rule-driven
workflow and case management
organizational context
outsourcing and
process modeling
attributes
data object
event and activity
gateway and sequence flow
group and text annotation
message flow and association
modeling languages
notation
pool and lane
process-driven services
roles
simple order process
simulation models
SOA in
process-driven services
security risks in
service unit
transfer of value
transformation management service unit
with human roles
within service units
business rules and regulations
Business-modeling
business dynamics modeling
automobile market model
business processes
business rules and regulations
choreographies
disruptive events and applications portfolio
enterprise logical data model
languages
management dashboards
organization structure and role-based access control
semantics
service unit
cost models
performance
specification
simulation
stereotypes and tagged values
strategic planning and electronic documents
tactical solutions
value chains
vocabularies uses of and data elements
canonicalization algorithm
capabilities and
capabilities and responsibilities of
Capability maturity model integration (CMMI)
cardinality in
Case management in business process
Certificate authority (CA)
Certificate revocation list (CRL)
changing relationships
characteristics of, 2nd
choreographies
Choreography
complementary internal process
extended
complex, roles in
sequence of exchange
clustering
collaboration
Collaboration coupling and service
collaborative activities and
Commercial off-the-shelf (COTS)
application
software products
common model
Common object request broker architecture (CORBA)
Common warehouse metamodel (CWM)
compartmentalization
complementary internal process
complex event processing
Complex event processing (CEP)
complex, roles in
compound
computer role in
Computer-based tools in business
concepts of, 2nd, 3rd
configuration
Configuration management database (CMDB) of IT operations
consistency and
consistency and economies
consistency in
consistent data, need for
consolidation
contents in
context
continuous change and incentives
continuous strategic planning
control
Conventional business unit silos
Corporate average fuel economy (CAFE) regulations
Corporate reporting
Cost accounting
cost models
COTS application
Credit sale choreography
Critical success factors (CSFs)
current architecture
customer order in
Customer relationship management (CRM)
customers in
data access
data and information
data hiding
data integrity
Data modeling
class models and
cardinality in
data and
exchange
hiding and interface
integrity rules
subsets and
warehouses
semantics
data models
data object
data replication
database
databases
degree of coupling
delivery locations
dependency network, 2nd
design
design objectives
Design objectives for business activities
development projects
diagnostic
Digital certificates
exchange
fields
digital signature
dimensions of
Discrete event simulation
disjunctive and conjunctive match
disruptive event
Disruptive events
disruptive events and applications portfolio
duration and intensity
duty separation
e-business business process (ebBP)
Eclipse process framework (EPF)
ecosystem
Edit order
electronic commerce
Electronic data interchange (EDI)
Electronic documents and security
accountability and
as evidence
authenticity preservation
canonicalization algorithm
compound
electronic notary service
electronic signatures
digital signature
elements
hash value and
encryption and signatures
private key
public key and secret key
transformation
electronic infrastructure
electronic notary service
electronic technology
elements
enhanced modeling capabilities
enterprise, 2nd
Enterprise application integration (EAI)
trusted systems
enterprise applications
Enterprise business model (EBM)
database
master data records
viewpoints
enterprise business model in
enterprise change
enterprise ecosystem
Enterprise information integration (EII)
consistency and
OMG CWM specification in
schema and mapping
Enterprise information management (EIM)
agile enterprise
business models
enterprise state and
cross-enterprise views
optimization
data representation
consistency in
exchange and integration of
databases
service units
enterprise applications
user and
shared knowledge
Enterprise intelligence (EI) service unit
enterprise logical data model
Enterprise logical data model (ELDM)
common model
industry standards
enterprise optimization, requirements
enterprise rules and assignments
Enterprise service bus (ESB)
enterprise state and
enterprise structure of
enterprise transformation
Enterprise transformation (ET)
Enterprises
ecosystem
rules
transformation perspectives
value chains
Entity-relationship (ER)
eTOM framework
eTOM Operations Level 2 Processes
eTOM strategy, infrastructure and product segment
event
event and activity
Event notification infrastructure
publish-and-subscribe facility
requirements
anticipated events
broken assumptions
surrogate publishers, types
Event resolution business framework
enterprise ecosystem
executive staff
line-of-business manager
product life cycle for
processes
service unit manager
roles of
service interfaces
Eventcondition-action (ECA) rules
Event-driven agility
broker capability
event notices, sources of
complex event processing
external events
internal events
look-back
verification and consolidation of
event origins
business environment
enterprise change
innovation
operational categories of
events of interest, identification of
relevant events
risk threshold
rules
Event-driven architecture (EDA)
example of
exchange, 2nd
exchange and integration of
exchange, type of
executive staff, 2nd
executive staff support, 2nd
Expense approver role specification
expense report process
extended
eXtensible access control markup language (XACML) policies
disjunctive and conjunctive match
policy set structure
target element
eXtensible markup language (XML)
characteristics of
customer order in
extensible stylesheet language transformations (XSLT)
human relations XML (HR-XML)
schema
XML business reporting language (XBRL)
XML for metadata interchange (XMI), standard form of model exchange
XML process definition language (XPDL)
XML-signature
extensible stylesheet language transformations (XSLT)
external events
Extract transform load (ETL)
fields
finance and accounting
finance and accounting services
Financial services and agility
for business relationships
Forward chaining
framework
Fulfill order
functional groups
fundamental forms of
future value network
gap analysis
gateway and sequence flow
goals and objectives
government regulation
government regulation in
Government regulations
government regulations and
grant of authority
granularity
graphical elements
group
group and text annotation
hash value and
hiding and interface
hierarchy of, 2nd
human relations XML (HR-XML)
human resources (HR) management services
Human resources (HR) management services
changing relationships
incentives and alignment of organizational goals, development of
human resources (HR) services
Hyper text transport protocol (HTTP)
If-then/condition action rules
implementation
implementation of compliance
improvements
in organization structure
in value chain
incentives and alignment of organizational goals, development of
Industry frameworks
data models
example of
processes
rules
service units
industry standards
Information management metamodel (IMM)
information technology
Information technology (IT) organization
adapted legacy application
batch process legacy
COTS application
executive staff support
infrastructure management
management
rearchitecting
service units support automation
standards and technology selections
infrastructure management, 2nd
innovation
integration of
integrity and security
integrity rules
intelligence and empowerment
interfaces, 2nd
internal events
internal process
International Federation of Accountants (IFA)
Internet
Internet and
Internet Engineering Task Force (IETF)
IT application
Java community process (JCP)
Java Messaging Service (JMS)
job-shop
Job-shop mode in business process
Key performance indicators (KPIs)
knowledge and wisdom
Knowledge management
expertise of people
techniques in
unstructured documents
accessibility and
Web search and
Knowledge-based systems
language for business level process modeling
languages
Legacy systems
Lightweight directory access protocol (LDAP)
master data management and
line organizations
Line-of-business (LOB) manager
logging and alerts
Logic programming
Logical data model (LDM)
consistent data, need for
enterprise
metadata
business
contents in
technical
physical
look-back
loose coupling, 2nd
Loose coupling
management, 2nd
management dashboards
Management dashboards
management systems
manager, role of
managers, role in
master data
Master data management
data hiding
integrity and security
service unit
granularity
source
master data management and
master data records
maturity model, 2nd
message flow and association
message transformation
Message transformation
Meta object facility (MOF)
repository product
metadata
Metadata interchange (XMI)
mitigation of risks
Model-based management (MBM)
business organizations
computer based
models of enterprise
tools
model-driven architecture
Model-driven architecture (MDA)
modeling technology
modeling, 2nd
modeling languages
modeling technology
modeling technology standards
modeling tools
models
models of enterprise
modernization
monitoring and audits
Multitoken authentication
National Association of Securities Dealers (NASD) monitors
network of services
new product line/business introduction, 2nd
new/improved product
next-generation architecture, 2nd
notation
notification
Object management group (OMG)
model-driven architecture
standards
Obligatory
Obsolete technology
OMG CWM specification in
Open applications group, inc. (OAGi)
operational categories of
operational data stores
Operational data stores (ODS)
opportunities for consolidation, 2nd
optimization
optimization of performance and information technology
orderly, incremental transformation
order-processing service
Order-processing service unit
organization design
Organization for advancement of structured information standards (OASIS)
organization structure and role-based access control
organizational context
organizational dimension
organizational relationships, 2nd
Organizations
aggregation factors
consistency and economies
degree of coupling
outsourcing
performance measures
top down and bottom up
modeling
separation factors
duty separation
user independent
structure
transformation, levels in
outsourcing, 2nd, 3rd
Outsourcing
risks and benefits of
outsourcing and
oversight and performance assessment
ownership
people qualifications
performance, 2nd
performance measures
physical
Platform-independent models (PIM)
language for business level process modeling
Platform-specific models (PSM)
policy
policy from OASIS
policy set structure
pool and lane
portal
portal support
priorities
private key
process relationships
process-driven services, 2nd, 3rd
processes, 2nd
processes and organizations roles
Product
configuration
line organizations
production rules
rules engine
production-line mode in business process
value chain
product configuration
product life cycle for
product life-cycle
production rules
production-line
production-line mode in business process
Prolog statements
Proof-of-concept development
public key and secret key
Public key infrastructure (PKI)
publish-and-subscribe facility
Purchase choreography
purchasing
purchasing service units
Purchasing service units
qualification of
Qualification rules
access control rules
people qualifications
service policies
Query, View, Transformation (QVT)
Real-time expert system
rearchitecting
Registration authority (RA)
registry services
Registry services
Regulatory compliance
regulatory compliance of
relationships
relay
Relay mode in business process
relevant events
Reliable messaging
repository product
requesting and relying party
Request-response exchanges
responsibilities
Rete network
Risk management
risk management and economies of scale
risk threshold
risks and benefits of
roadmap
Robust value chain analysis (RVC)
abstract activities
dependency network
hierarchy of
role authorization specifications
Role-based access control (RBAC)
authorization requirements and subjects
attributes
data access
grant of authority
organizational relationships
process relationships
processes and organizations roles
relationships
roles, types of
security role
surrogate role
roles, 2nd
roles of, 2nd
roles, administration of
roles, types of
rule-driven
Rule-driven processes
rules, 2nd, 3rd
rules engine
Rules repository data model
runtime
Sarbanes-Oxley Act
schema
schema and mapping
security, 2nd
Security assertion markup language (SAML)
security concerns
security risks in
security role
Seller internal process
semantics, 2nd
Semantics of business vocabulary and rules (SBVR)
specification
sequence of exchange, 2nd
serialization in
service distribution
service implementation
service interfaces
service performance monitoring
service policies
Service request life cycle
delivery locations
service distribution
short and long
single service operation
service unit
service unit and
service unit automation
service unit autonomy
service units, 2nd
Service units
as building blocks
as shared capability
autonomy
characteristics of
collaborative relationships and
duration and intensity
electronic commerce
executive staff
finance and accounting services
granularity
clustering
data replication
group
human resources (HR) services
in organization structure
in value chain
integration of
interfaces
line of business
product life-cycle
management
control
service implementation
manager, role of
master data
organizational dimension
ownership
performance
portal
product development
eTOM strategy, infrastructure and product segment
new/improved product
production value chain
customers in
functional groups
purchasing service units
serialization in
service-oriented value chain
specifications of
standards and technology
support
template
transformation
IT application
types of
value chain
modeling
value network services
work management
service units support automation
Service-based management
Service-oriented architecture (SOA)
billing for services
BPMS and
business benefits
electronic infrastructure
for business relationships
maturity model
message transformation
portal support
processes in
loose coupling
process-driven services
security
service unit and
transfer of value
registry services
security
service performance monitoring
service-oriented analysis
consolidation
interfaces
outsourcing
roles
specifications
value chain analysis
work management
Service-oriented architecture (SOA) security
access control
administration
application level
roles, administration of
accountability and nonrepudiation
and information technology
and top management
authorization
access
runtime
business architecture
compartmentalization
enterprise structure of
identification and authentication
fundamental forms of
requesting and relying party
logging and alerts
maturity model
monitoring and audits
network of services
perimeter security
Internet and
security concerns
single sign-on
technology diversity
two-way authentication
vulnerability scanning and intrusion detection
Service-oriented enterprise
service-oriented value chain
Shared information and data (SID)
shared knowledge
Shipment choreography
short and long
simple order process
simulation
simulation models
single service operation
single sign-on
SOA benefits and, 2nd
SOA implications of
software products
source
specification, 2nd
specifications
specifications of
standards
standards and technology
standards and technology selections
standards and tools
standards-based exchange of models
stereotypes and tagged values
strategic architecture
strategic planning and electronic documents
structure, 2nd
subsets and
support
support automation
surrogate publishers, types
surrogate role
Systems engineering process metamodel (SPEM) from OMG
tactical solutions
target element
Tariffs
technical
technical infrastructure
techniques in
technology
technology diversity
technology modernization in
Telecom operations map (eTOM) from tele management forum (TMF)
Telecommunication industry and agility
Telemanagement forum (TMF)
template
Tight coupling
tools
top down and bottom up
Transaction-driven systems
transfer of value, 2nd
transformation
transformation management service unit
transformation perspectives
transformation priorities
transformation, levels in
Trust domains federation
exchange, type of
trusted systems
two-way authentication
types of, 2nd
Unified modeling language (UML)
United Nations centre for trade facilitation and electronic business (UN/CEFACT)
user and
user independent
value chain, 2nd, 3rd
Value chain
abstraction
dependency network
hierarchy of
models
value chain analysis
value chains, 2nd
value network
value network services, 2nd
verification and consolidation of
viewpoints
vocabularies uses of and data elements
vulnerability scanning and intrusion detection
warehouses
Web ontology language (OWL)
Web search and
Web services
Web services (WS)
notification
policy
policy from OASIS
technology
Web services choreography definition language (WS-CDL)
with human roles
within service units
work management, 2nd
Work management service units
workflow and case management
workflow management systems
World Wide Web consortium (W3C)
XML business reporting language (XBRL)
XML for metadata interchange (XMI), standard form of model exchange
XML process definition language (XPDL)
XML-signature