Sciweavers

915 search results - page 50 / 183
» Security in Business Process Engineering
Sort
View
IESA
2007
13 years 9 months ago
Business Level Service-Oriented Enterprise Application Integration
In this paper we propose a new approach for service-oriented enterprise application integration (EAI). Unlike current EAI solutions, which mainly focus on technological aspects, ou...
Stanislav Pokraev, Dick A. C. Quartel, Maarten W. ...
ISN
1998
Springer
13 years 12 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
ACSAC
2007
IEEE
14 years 2 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
ICWE
2010
Springer
13 years 9 months ago
Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements
:  Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements Hamid R. Motahari-Nezhad, Sven Graupner, Sharad Singhal HP Laboratories HPL...
Hamid R. Motahari Nezhad, Sven Graupner, Sharad Si...
QSIC
2007
IEEE
14 years 2 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao