Sciweavers

134 search results - page 6 / 27
» Detecting Clones in Business Applications
Sort
View
COMPSAC
2009
IEEE
14 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
SIGMOD
2002
ACM
114views Database» more  SIGMOD 2002»
13 years 9 months ago
An Active Functionality Service for E-Business Applications
Service based architectures are a powerful approach to meet the fast evolution of business rules and the corresponding software. An active functionality service that detects event...
Mariano Cilia, Alejandro P. Buchmann
JOT
2010
113views more  JOT 2010»
13 years 8 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
BTW
2009
Springer
173views Database» more  BTW 2009»
14 years 1 months ago
Enhancing Business Intelligence with Unstructured Data
: Quality early warning and proactive customer churn detection are two examples of applications that can benefit from insights gained from unstructured text data. The term “Unstr...
A. Lang, M. Ortiz, St. Abraham
ISF
2007
139views more  ISF 2007»
13 years 9 months ago
Integrated model-driven dashboard development
Abstract Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an ...
Themis Palpanas, Pawan Chowdhary, George A. Mihail...