Sciweavers

915 search results - page 86 / 183
» Security in Business Process Engineering
Sort
View
ASWEC
2008
IEEE
14 years 4 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
DSS
2007
112views more  DSS 2007»
13 years 10 months ago
Service-based P2P overlay network for collaborative problem solving
This paper describes a service-based P2P overlay network architecture to support a collaborative environment for solving complex business processes over the network. In the propos...
Sanjay Goel, Shashishekara S. Talya, Michael W. So...
ISPASS
2005
IEEE
14 years 3 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
AINA
2010
IEEE
14 years 3 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie