Sciweavers

70 search results - page 10 / 14
» Secure Business Process Management: A Roadmap
Sort
View
COMPSAC
2009
IEEE
13 years 10 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
AISM
2004
13 years 8 months ago
Securing Web Services with XML aware Digital Signatures
The evolution of web services has facilitated the integration of business processes scattered across different geographical locations of the world. Along with the benefits that we...
Sabbir Ahmed, Leisa Armstrong
AINA
2010
IEEE
13 years 11 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
MKWI
2008
168views Business» more  MKWI 2008»
13 years 8 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
CAISE
2003
Springer
13 years 12 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen