Sciweavers

915 search results - page 39 / 183
» Security in Business Process Engineering
Sort
View
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
14 years 1 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
ICSEA
2007
IEEE
14 years 2 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
ESWS
2007
Springer
14 years 1 months ago
Semantic Process Retrieval with iSPARQL
Abstract. The vision of semantic business processes is to enable the integration and inter-operability of business processes across organizational boundaries. Since different orga...
Christoph Kiefer, Abraham Bernstein, Hong Joo Lee,...
ACSAC
1999
IEEE
14 years 8 hour ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
ATAL
2008
Springer
13 years 9 months ago
LS/ABPM - an agent-powered suite for goal-oriented autonomic BPM
In this paper we shortly describe the Living Systems Autonomic Business Process Management (LS/ABPM) software product. LS/ABPM is an integrated environment, based on J2EE, Eclipse...
Giovanni Rimassa, Martin E. Kernland, Roberto Ghiz...