Sciweavers

626 search results - page 5 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
AOSE
2007
Springer
13 years 11 months ago
Refining Goal Models by Evaluating System Behaviour
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...
EATIS
2007
ACM
13 years 11 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
ETRICS
2006
13 years 11 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
CBSE
2011
Springer
12 years 7 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
ACSW
2004
13 years 9 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald