Sciweavers

2270 search results - page 172 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
138
Voted
VIS
2004
IEEE
163views Visualization» more  VIS 2004»
16 years 4 months ago
Dispersion Simulation and Visualization For Urban Security
We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminan...
Arie E. Kaufman, Feng Qiu, Haik Lorenz, Jianning W...
115
Voted
ENTCS
2000
112views more  ENTCS 2000»
15 years 3 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
133
Voted
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
15 years 9 months ago
Does the Extended Technology Acceptance Model Apply to Physicians
In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
William G. Chismar, Sonja Wiley-Patton
162
Voted
CAISE
2009
Springer
15 years 10 months ago
An Information Model Capturing the Managed Evolution of Application Landscapes
Projects are the executors of organizational change and hence in charge of the managed evolution of the application landscape in the context of enterprise architecture (EA) managem...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...
BPM
2006
Springer
107views Business» more  BPM 2006»
15 years 7 months ago
On the Suitability of BPMN for Business Process Modelling
Abstract. In this paper we examine the suitability of the Business Process Modelling Notation (BPMN) for business process modelling, using the Workflow Patterns as an evaluation fr...
Petia Wohed, Wil M. P. van der Aalst, Marlon Dumas...