Sciweavers

915 search results - page 107 / 183
» Security in Business Process Engineering
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
RE
2010
Springer
13 years 3 months ago
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study
Companies in the software business often distribute requirements engineering responsibilities over several roles. Product management has overall product responsibility and performs...
Samuel Fricker, Martin Glinz
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
14 years 1 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
FOSSACS
2004
Springer
14 years 2 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
ESORICS
2007
Springer
14 years 3 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu