Sciweavers

59 search results - page 4 / 12
» A Knowledge-based Security Policy Framework for Business Pro...
Sort
View
BIS
2009
112views Business» more  BIS 2009»
13 years 6 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
IEEEARES
2010
IEEE
14 years 26 days ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
CCS
2010
ACM
13 years 3 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
13 years 6 months ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas
DSOM
2006
Springer
14 years 6 days ago
Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL
Abstract. The goal of ontology-based management is to improve the manageability of network resources through the application of formal ontologies. Prior research work has studied t...
Antonio Guerrero, Víctor A. Villagrá...