Sciweavers

249 search results - page 21 / 50
» Modelling Security Goals in Business Processes
Sort
View
SACMAT
2009
ACM
14 years 10 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
IQ
2001
13 years 9 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
COLCOM
2007
IEEE
14 years 2 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...
CAISE
2004
Springer
14 years 1 months ago
Enriching Ontology Languages Adequacy for eBusiness Domain
Abstract. The definition of a domain ontology is a complex activity that requires two kinds of expertise: a deep knowledge of the domain to be modeled and a good level of familiari...
Michele Missikoff, Federica Schiappelli
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
13 years 11 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson