Sciweavers

39 search results - page 3 / 8
» Modeling Social and Individual Trust in Requirements Enginee...
Sort
View
BPM
2003
Springer
75views Business» more  BPM 2003»
14 years 1 days ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
IEEEARES
2007
IEEE
14 years 1 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
CSE
2009
IEEE
14 years 1 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
SPW
2004
Springer
14 years 5 days ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
CSCW
2004
ACM
14 years 7 days ago
Collaborative modeling: hiding UML and promoting data examples in NEMo
Domain experts are essential for successful software development, but these experts may not recognize their ideas when abstracted into Unified Modeling Language (UML) or ontologie...
Patricia K. Schank, Lawrence Hamel