Sciweavers

249 search results - page 28 / 50
» Modelling Security Goals in Business Processes
Sort
View
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 2 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
IEEESP
2006
108views more  IEEESP 2006»
13 years 7 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
MODELS
2007
Springer
14 years 1 months ago
Reconciling TGGs with QVT
ant Talks Abstracts Modelling Tools: Claudia Ermel: Tiger Harmen Kastenberg: GROOVE Christian Köhler: EMF Model Transformation Ákos Horváth: The VIATRA2 Model Transformation Fra...
Joel Greenyer, Ekkart Kindler
TRUSTBUS
2007
Springer
14 years 1 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
CAISE
2004
Springer
14 years 1 months ago
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Abstract. Ubiquitous Mobile Systems (UMSs) allow for automated capturing of events. Both mobility and ubiquity are supported by electronic means such as mobile phones and PDAs and ...
Ana Karla A. de Medeiros, Boudewijn F. van Dongen,...