Sciweavers

5475 search results - page 19 / 1095
» Model Driven Security
Sort
View
ACISICIS
2007
IEEE
14 years 4 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
14 years 1 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
SYNASC
2005
IEEE
158views Algorithms» more  SYNASC 2005»
14 years 3 months ago
Integrating Role Activity Diagrams and Hybrid IDEF for Business Process Modeling Using MDA
Business process modeling is an important phase during requirements collection. Usually functional, dynamic and role models are needed. We propose to integrate Role Activity Diagr...
Costin Badica, Maria Teodorescu, Cosmin Spahiu, Am...