Sciweavers

3193 search results - page 97 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
BPM
2006
Springer
132views Business» more  BPM 2006»
13 years 9 months ago
Product-Driven Enterprise Interoperability for Manufacturing Systems Integration
The "Babel tower effect", induced by the heterogeneity of applications available in the operation of enterprises brings to a consistent lack of "exchangeability"...
Michele Dassisti, Hervé Panetto, Angela Tur...
OOPSLA
2005
Springer
14 years 1 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 7 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
CORR
2011
Springer
212views Education» more  CORR 2011»
12 years 11 months ago
Decision Support Tools for Cloud Migration in the Enterprise
— This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of...
Ali Khajeh-Hosseini, Ian Sommerville, Jurgen Bogae...
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
14 years 8 hour ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes