Sciweavers

915 search results - page 111 / 183
» Security in Business Process Engineering
Sort
View
IM
2003
13 years 10 months ago
A Revenue-based Model for Making Resource Investment Decisions in IP Networks
: Capacity planning is a critical task in network management. It identifies how much capacity is needed to match future traffic demand. It directly affects customer satisfaction ...
Srinivasan Jagannathan, Jörn Altmann, Lee Rho...
SAC
2009
ACM
14 years 3 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
DSN
2004
IEEE
14 years 19 days ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...
AMAST
2008
Springer
13 years 11 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
QOSA
2009
Springer
14 years 3 months ago
Achieving Agility through Architecture Visibility
L.L.Bean is a large retail organization whose development processes must be agile in order to allow rapid enhancement and maintenance of its technology infrastructure. Over the pas...
Carl Hinsman, Neeraj Sangal, Judith A. Stafford