Sciweavers

344 search results - page 12 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ECEH
2006
95views Healthcare» more  ECEH 2006»
13 years 10 months ago
Information Need and IT Demands for Business Process Reengineering in Operation Room Management
: As the economic importance of operation room (OR) management is increasing, the aim of this paper is to analyse the information need for business process reengineering (BPR) in O...
Anja Zöller, Christof Denz, Andre S. Baumgart...
ICWS
2007
IEEE
13 years 10 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
13 years 9 months ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
IS
2008
13 years 8 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst