Sciweavers

915 search results - page 49 / 183
» Security in Business Process Engineering
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 10 days ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
ACSAC
2006
IEEE
14 years 1 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
AINA
2009
IEEE
14 years 2 months ago
Business Compliance Governance in Service-Oriented Architectures
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...
Florian Daniel, Fabio Casati, Vincenzo D'Andrea, E...
SPLC
2000
13 years 9 months ago
Value-based software engineering (VBSE)
: We consider a set of programs a family when it pays to look at their common aspects before looking at their differences. For commercial software developers the implications are t...
Stuart R. Faulk, Robert R. Harmon, David Raffo
DLOG
2003
13 years 9 months ago
Status Report on Description Logics related Project in Korea
In this short position paper, the project of building intelligent business information infrastructure using semantic web, ontology, description logics, and other related knowledge...
Shinyoung Lim