Sciweavers

915 search results - page 114 / 183
» Security in Business Process Engineering
Sort
View
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 7 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
EMISA
2006
Springer
14 years 17 days ago
On Design Principles for Realizing Adaptive Service Flows with BPEL
Abstract: Web service technology offers a promising approach for realizing enterprisewide and cross-organizational business applications. With the Business Process Execution Langua...
Manfred Reichert, Stefanie Rinderle
ICRE
1998
IEEE
14 years 1 months ago
Viewpoints for Requirements Elicitation: A Practical Approach
This paper introduces an approach to multi-perspective requirements engineering (PREview) which has been designed for industrial use and discusses our practical experience in appl...
Ian Sommerville, Peter Sawyer, Stephen Viller
JPDC
2006
83views more  JPDC 2006»
13 years 8 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
OOPSLA
2009
Springer
14 years 3 months ago
Enhancing source-level programming tools with an awareness of transparent program transformations
Programs written in managed languages are compiled to a platform-independent intermediate representation, such as Java bytecode. The relative high level of Java bytecode has engen...
Myoungkyu Song, Eli Tilevich