Sciweavers

109 search results - page 5 / 22
» A BPMN Extension for the Modeling of Security Requirements i...
Sort
View
EMISAIJ
2010
13 years 2 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 11 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
APSEC
2003
IEEE
14 years 25 days ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
BDIM
2008
IEEE
185views Business» more  BDIM 2008»
14 years 2 months ago
Addressing the impact of business process changes on software user interfaces
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
Kênia Soares Sousa, Hildeberto Mendonç...
SPLC
2010
13 years 5 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...