%PDF-1.4
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
2013 3rd International Symposium ISKO-Maghreb;2013; ; ;10.1109/ISKO-Maghreb.2013.6728170
Enterprise architecture
change management
security
access control
knowledge model
Secure governance in enterprise architecture — Access control perspective
Khaled Gaaloul
Marwane El Kharbili
Henderik A. Proper
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
xʹ0~bJPt)h #b`
'ih[zB#L.w8d
7qZRs$ǮNV8X~j9{FX)+ƱA
8MPij|>stream
x+ |
endstream
endobj
7 0 obj
<>stream
xʹ0~bJPt)h #b`
'ih[zB)PRGiMVSoކ8
]9tcWV'i+,?Wm#eUy i&(Y>IuQ86F9Xi;B_ݩP-}%X=
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
x0DS.KxAD%
ǠiΜlFEG0:SO܅/D&3ÿ8~Oױ")?,ߵmaMżsl<3QZź*;#N'NXGu`T)Ӗ$=
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xAO@s6ܰŤuIҲ,_/|NoVB_IaQ[6C9/k:XL,e8JSeP;6>p`n%8ȏvWѳE?f*KF]+szUUx 'Kdq89FTi##=
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
xʹ0~bJPt)h #b`
'ih[zBcL.w8d
7qZRs$ǮNV8X~j9{FX)+ƱA
8MPij|>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xʹ0~bJPt)h #b`
'ih[zBPRGiM[Myn+>k;^w9H]YpsxcZ_5RVW,c4qgx2'5EQq:vb=ʦ1}uBў&=
endstream
endobj
16 0 obj
<>stream
h
_$ !j
endstream
endobj
17 0 obj
[/Indexed 18 0 R 1 19 0 R]
endobj
18 0 obj
[/ICCBased 20 0 R]
endobj
19 0 obj
<>stream
xRVd
endstream
endobj
20 0 obj
<>stream
hެy8Tq?)B$*"[V"%0>g}7320}'KKRv~ӽ<ܿ|99=iO,<O^6i6L@֡a U;0hѿZï$?-)L hQ*MI%*@9KUeHV/t4-:qضJ-@jʖ%rd$' _W|o岁S\hҕp^&ɖJI:C#,
._18MLr-z~( PS$5]RW[gWU.KF55/"^Xe[:zE7Qp[i{Ŏѝ;wGM{Nolv<ڂb)?n5n[Cg9?qqA'.:\}w0t
;C8;7݅3A!ЖwÞX31>"߈nR%I22<uw~tЃµ[ ZR%R@ͥI"Idpn =HQB%xXҝ(-bf#rsO(V*rxa4hŘ t}}>qRSmogn=nO;>>&|˪/3_%\q'Woo(kW-_XPi5ӥxVͩZWl_eFkuuhU_gz#7o|cۆ
mѹeWaQn$gO^iƾ|39C5pVk
8CF#GGЎ'3Et25-],n8sӧsC>;?ya*h!.
WBğ_Q?]qOMN w$קBbN@qpt qZL[:y{RGt˓1n-J},6it@|Mr>&0kmzײfyB/.(I袔⸒KeUxUWVԜu;Qpѭɳ٧ſͰ N-mv;'uO_|åC|dWosa߯3W?~KFD-tr++!+a`:P]Qpp&[m=otwڥ#&m{jf'!--xX9Z=v!-;cG;|֩¹%5Ս}NzR3Y9/ُO
2γ.px"w!#4rVXvJn