Sciweavers

1432 search results - page 208 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
JCP
2008
128views more  JCP 2008»
15 years 4 months ago
Life Cycle for Change Management in Business Processes using Semantic Technologies
In a fast changing market environment the task of reducing the downtime for change management of business processes has high importance. Ensuring that IT reflects the updated busin...
Uttam Kumar Tripathi, Knut Hinkelmann, Daniela Fel...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICWS
2008
IEEE
15 years 5 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...
ISORC
2005
IEEE
15 years 9 months ago
Adaptable Situation-Aware Secure Service-Based (AS3) Systems
Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...
ISSRE
2007
IEEE
15 years 5 months ago
Generating Trace-Sets for Model-based Testing
Model-checkers are powerful tools that can find individual traces through models to satisfy desired properties. These traces provide solutions to a number of problems. Instead of...
Birgitta Lindström, Paul Pettersson, Jeff Off...