Sciweavers

915 search results - page 110 / 183
» Security in Business Process Engineering
Sort
View
ICSM
1996
IEEE
14 years 1 months ago
A Design Environment for Migrating Relational to Object Oriented Database Systems
: Object-oriented technology has become mature enough to satisfy many new requirements coming from areas like computer-aided design (CAD), computer-integrated manufacturing (CIM), ...
Jens H. Jahnke, Wilhelm Schäfer, Albert Z&uum...
DEBU
2002
112views more  DEBU 2002»
13 years 8 months ago
Architecture and Implementation of an XQuery-based Information Integration Platform
An increasing number of business users and software applications need to process information that is accessible via multiple diverse information systems, such as database systems,...
Yannis Papakonstantinou, Vasilis Vassalos
CSE
2009
IEEE
14 years 3 months ago
Names of Our Lives
—Identifiers are an essential component of online communication. My research focuses on the ways that social, technical and policy factors affect people’s behavior with online...
Benjamin M. Gross
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
COLCOM
2008
IEEE
14 years 3 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann