Sciweavers

915 search results - page 45 / 183
» Security in Business Process Engineering
Sort
View
ICST
2009
IEEE
14 years 2 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
JTAER
2008
100views more  JTAER 2008»
13 years 7 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
CAISE
2003
Springer
13 years 11 months ago
The Focus of Requirements Engineering in Workflow Application Development
The paper discusses the focus of Requirements Engineering in workflow application development. Its core thesis is that the workflow application and the new business process it supp...
Niko Kleiner
EWSPT
2001
Springer
14 years 6 days ago
Towards a Living Software Development Process Based on Process Patterns
A Software Development Process for a certain enterprise and/or a certain project will usually integrate elements from a variety of existing process models, comprising generic stand...
Michael Gnatz, Frank Marschall, Gerhard Popp, Andr...
PROFES
2001
Springer
14 years 4 days ago
Modular Process Patterns Supporting an Evolutionary Software Development Process
Change and evolution of business and technology imply change and evolution of development processes. Besides that for a certain enterprise and/or project we will usually integrate ...
Michael Gnatz, Frank Marschall, Gerhard Popp, Andr...