default search action
Pascal van Eck
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [p1]Roel J. Wieringa, Pascal A. T. van Eck, Dennis Krukkert:
Architecture Alignment. Enterprise Architecture at Work, 4th ed. 2017: 253-275 - 2013
- [j9]Laura Ponisio, Pascal van Eck, Lourens Riemens:
Using Network Analysis to Improve Decision Making for Partner Selection in Inter-Organizational Networks. Int. J. Hum. Cap. Inf. Technol. Prof. 4(3): 26-39 (2013) - [j8]Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa:
Engineering Security Agreements Against External Insider Threat. Inf. Resour. Manag. J. 26(4): 66-91 (2013) - [c29]María Laura Ponisio, Pascal van Eck, Lourens Riemens, Noriyuki Matsuda:
Using Network Analysis to Discover Cooperation Opportunities in Inter-organizational Networks. EuroSPI 2013: 119-130 - [c28]Roel J. Wieringa, Pascal van Eck, John Mylopoulos:
Requirements engineering conferences: Wither industry tracks? RE 2013: 349-352 - 2012
- [j7]María Laura Ponisio, Pascal van Eck:
Metrics-based control in outsourced software development projects. IET Softw. 6(5): 438-450 (2012) - 2010
- [c27]Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa:
External Insider Threat: A Real Security Challenge in Enterprise Value Webs. ARES 2010: 446-453 - [c26]Floor de Jong, Jos van Hillegersberg, Pascal van Eck, Feiko van der Kolk, Rene Jorissen:
Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships. Global Sourcing Workshop 2010: 119-150
2000 – 2009
- 2009
- [c25]Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes:
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. ARES 2009: 546-553 - [c24]Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck:
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. SAC 2009: 66-73 - [e1]Pascal van Eck, Jaap Gordijn, Roel J. Wieringa:
Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings. Lecture Notes in Computer Science 5565, Springer 2009, ISBN 978-3-642-02143-5 [contents] - 2008
- [j6]María Laura Ponisio, Klaas Sikkel, Lourens Riemens, Pascal van Eck:
Combining visualisation techniques to understand co-operation in inter-organisational systems. J. Syst. Inf. Technol. 10(2): 159-179 (2008) - [c23]Roberto Santana Tapia, Maya Daneva, Pascal van Eck, Roel J. Wieringa:
Towards a business-IT aligned maturity model for collaborative networked organizations. EDOCW 2008: 276-287 - [c22]Novica Zarvic, Roel J. Wieringa, Pascal van Eck:
On Quality Issues in Networked Value Constellations. Virtual Enterprises and Collaborative Networks 2008: 425-432 - [c21]Roberto Santana Tapia, Maya Daneva, Pascal van Eck, Nicte-Há Castro Cárdenas, Leida van Oene:
Business-IT Alignment Domains and Principles for Networked Organizations: A Qualitative Multiple Case Study. OTM Workshops 2008: 241-252 - [c20]Novica Zarvic, Roel J. Wieringa, Pascal van Eck:
Checking the alignment of value-based business models and IT functionality. SAC 2008: 607-613 - [c19]T. G. J. Schepers, Maria-Eugenia Iacob, Pascal van Eck:
A lifecycle approach to SOA governance. SAC 2008: 1055-1061 - 2007
- [j5]Maya Daneva, Pascal van Eck:
What Enterprise Architecture and Enterprise Systems Usage Can and Can not Tell about Each Other. Int. J. Comput. Sci. Appl. 4(2): 93-109 (2007) - [j4]João Paulo A. Almeida, Maria-Eugenia Iacob, Pascal van Eck:
Requirements traceability in model-driven development: Applying model and transformation conformance. Inf. Syst. Frontiers 9(4): 327-342 (2007) - [c18]Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:
Specifying Information Security Needs for the Delivery of High Quality Security Services. BDIM 2007: 112-113 - [c17]Roberto Santana Tapia, Maya Daneva, Pascal van Eck:
Validating Adequacy and Suitability of Business-IT Alignment Criteria in an Inter-Enterprise Maturity Model 202. EDOC 2007: 202-213 - [c16]Virginia N. L. Franqueira, Pascal van Eck:
Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. EMMSAD 2007: 183-192 - [c15]Roberto Santana Tapia, Maya Daneva, Pascal van Eck:
Developing an Inter-Enterprise Alignment Maturity Model: Research Challenges and Solutions. RCIS 2007: 51-60 - [c14]Maya Daneva, Pascal van Eck:
What Enterprise Architecture and Enterprise Systems Usage Can and Can not Tell about Each Other. RCIS 2007: 133-142 - [c13]Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. SECURWARE 2007: 107-114 - 2006
- [c12]João Paulo A. Almeida, Pascal van Eck, Maria-Eugenia Iacob:
Requirements Traceability and Transformation Conformance in Model-Driven Development. EDOC 2006: 355-366 - [c11]Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:
A Business Goal Driven Approach for Information Security Requirements. EMMSAD 2006: 103-110 - [i1]Xiaomeng Su, Damiano Bolzoni, Pascal van Eck:
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. CoRR abs/cs/0603129 (2006) - 2005
- [c10]Pascal van Eck, Rieko Yamamoto, Jaap Gordijn, Roel J. Wieringa:
Cross-Organizational Workflows: A Classification of Design Decisions. CAiSE Short Paper Proceedings 2005 - [c9]Pascal van Eck, Rieko Yamamoto, Jaap Gordijn, Roel J. Wieringa:
Cross-Organizational Workflows: A Classification of Design Decisions. I3E 2005: 449-463 - 2004
- [j3]Pascal van Eck, Henk M. Blanken, Roel J. Wieringa:
Project Graal: Towards Operational Architecture Alignment. Int. J. Cooperative Inf. Syst. 13(3): 235-255 (2004) - [c8]Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel J. Wieringa:
Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191 - [c7]Pascal van Eck, Jaap Gordijn, Roel J. Wieringa:
Value-Based Design of Collaboration Processes for e-Commerce. EEE 2004: 349-358 - [c6]Pascal van Eck, Roel J. Wieringa, Jaap Gordijn:
Risk-Driven Conceptual Modeling of Outsourcing Decisions. ER 2004: 709-723 - [c5]Stanislav Pokraev, Zlatko Zlatev, Rogier Brussee, Pascal van Eck:
Semantic Support for Automated Negotiation with Alliances. ICEIS (4) 2004: 244-249 - 2003
- [c4]Zlatko Zlatev, Pascal van Eck:
An Investigation of the Negotiation Domain for Electronic Commerce Information Systems. ICEIS (4) 2003: 386-394 - 2001
- [j2]Frances M. T. Brazier, Pascal van Eck, Jan Treur:
Modelling a Society of Simple Agents: From Conceptual Specification to Experimentation. Appl. Intell. 14(2): 161-178 (2001) - [j1]Pascal van Eck, Joeri Engelfriet, Dieter Fensel, Frank van Harmelen, Yde Venema, Mark Willems:
A Survey of Languages for Specifying Dynamics: A Knowledge Engineering Perspective. IEEE Trans. Knowl. Data Eng. 13(3): 462-496 (2001) - [c3]Pascal van Eck, Roel J. Wieringa:
An Investigation into Agency Requirements in E-Business Information Systems. ICEIS (2) 2001: 1081-1085
1990 – 1999
- 1998
- [c2]Pascal van Eck, Joeri Engelfriet, Dieter Fensel, Frank van Harmelen, Yde Venema, Mark Willems:
Specification of Dynamics for Knowledge-Based Systems. Transactions and Change in Logic Databases 1998: 37-68 - 1997
- [c1]Frances M. T. Brazier, Pascal van Eck, Jan Treur:
Modelling Competitive Co-operation of Agents in a Compositional Multi-Agent Framework. EKAW 1997: 317-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint