Sciweavers

249 search results - page 37 / 50
» Modelling Security Goals in Business Processes
Sort
View
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
EON
2008
13 years 9 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
PVLDB
2010
129views more  PVLDB 2010»
13 years 6 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
EUROMICRO
2007
IEEE
14 years 2 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
SAJ
2000
129views more  SAJ 2000»
13 years 7 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha