Sciweavers

240 search results - page 10 / 48
» Privacy and Utility in Business Processes
Sort
View
IADIS
2003
14 years 8 days ago
Paradigm Shifts and Business Processes: A Case Study
The vast majority of IT systems are implemented using a traditional procedural paradigm approach using a suitable procedural language such as COBOL. However, with recent developme...
Paul Maclear, Paul Darbyshire
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 3 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
APSEC
2007
IEEE
14 years 2 months ago
A Method for Early Requirements Triage and Selection Utilizing Product Strategies
In market-driven product development large numbers of requirements threaten to overload the development organization. It is critical for product management to select the requireme...
Mahvish Khurum, Khurum Aslam, Tony Gorschek
EMISA
2005
Springer
14 years 4 months ago
A Domain Engineering Approach to Specifying and Applying Reference Models
: Business process modeling and design, as an essential part of business process management, has gained much attention in recent years. An important tool for this purpose is refere...
Iris Reinhartz-Berger, Pnina Soffer, Arnon Sturm
PODS
2011
ACM
229views Database» more  PODS 2011»
13 years 1 months ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...