Sciweavers

915 search results - page 43 / 183
» Security in Business Process Engineering
Sort
View
CCS
2006
ACM
13 years 11 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
ASWEC
2004
IEEE
13 years 11 months ago
A Process Framework for Characterising Security Properties of Component-Based Software Systems
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Khaled M. Khan, Jun Han
IWPC
2006
IEEE
14 years 1 months ago
An Approach for Extracting Workflows from E-Commerce Applications
For many enterprises, reacting to fast changes to their business process is key to maintaining their competitive edge in the market. However, developers often must manually locate...
Ying Zou, Maokeng Hung
ICSE
2000
IEEE-ACM
13 years 11 months ago
A software engineering approach and tool set for developing Internet applications
If a business built a plant to produce products without first designing a process to manufacture them, the risk would be lack of capacity without significant plant redesign. Simil...
David A. Marca, Beth A. Perdue
BPM
2005
Springer
102views Business» more  BPM 2005»
14 years 1 months ago
Integrating Process Learning and Process Evolution - A Semantics Based Approach
Companies are developing a growing interest in aligning their information systems in a process-oriented way. However, current processaware information systems (PAIS) fail to meet p...
Stefanie Rinderle, Barbara Weber, Manfred Reichert...