Sciweavers

249 search results - page 18 / 50
» Modelling Security Goals in Business Processes
Sort
View
ISSA
2004
13 years 9 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
SEMWEB
2007
Springer
14 years 1 months ago
Ontology-Based Information Extraction for Business Intelligence
Abstract. Business Intelligence (BI) requires the acquisition and aggregation of key pieces of knowledge from multiple sources in order to provide valuable information to customers...
Horacio Saggion, Adam Funk, Diana Maynard, Kalina ...
OTM
2005
Springer
14 years 1 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 8 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 2 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart