Sciweavers

915 search results - page 26 / 183
» Security in Business Process Engineering
Sort
View
ISPW
2006
IEEE
14 years 1 months ago
Tailor the Value-Based Software Quality Achievement Process to Project Business Cases
This paper proposes a risk-based process strategy decision-making approach. To improve the flexibility in applying the Value-Based Software Quality Achievement (VBSQA) process fram...
LiGuo Huang, Hao Hu, JiDong Ge, Barry W. Boehm, Ji...
SACMAT
2010
ACM
14 years 14 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
14 years 2 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
AGILEDC
2007
IEEE
14 years 2 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
ICSEA
2007
IEEE
14 years 1 months ago
A Framework for Classifying and Comparing Process Technology Domains
This paper introduces a framework for classifying and comparing three domains related to the process technology. More particularly, it gives process definitions, characteristics, m...
Reda Bendraou, Marie-Pierre Gervais