Sciweavers

1005 search results - page 32 / 201
» Information systems security engineering: a critical compone...
Sort
View
CIKM
2010
Springer
13 years 6 months ago
EntityEngine: answering entity-relationship queries using shallow semantics
We introduce EntityEngine, a system for answering entityrelationship queries over text. Such queries combine SQLlike structures with IR-style keyword constraints and therefore, ca...
Xiaonan Li, Chengkai Li, Cong Yu
EDBT
2010
ACM
185views Database» more  EDBT 2010»
13 years 10 months ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy
CSSE
2008
IEEE
14 years 3 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
RE
2001
Springer
14 years 1 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
SIGSOFT
2008
ACM
14 years 9 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde