In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Recently, service orientation has increasingly been debated both in research and practice. While researchers postulate a paradigm shift towards services as the basic unit of excha...
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...