Sciweavers

915 search results - page 60 / 183
» Security in Business Process Engineering
Sort
View
HICSS
2003
IEEE
122views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment
In an e-service environment, contracts are important for attaining business process interoperability and enforcing their proper enactment. An e-contract is the computerized facili...
Dickson K. W. Chiu, Shing-Chi Cheung, Sven Till
ASWEC
2006
IEEE
14 years 4 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
ACSAC
2000
IEEE
14 years 2 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
ICSOC
2009
Springer
14 years 2 months ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 10 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone