Sciweavers

915 search results - page 88 / 183
» Security in Business Process Engineering
Sort
View
DOCENG
2010
ACM
13 years 8 months ago
Semantics-enriched document exchange
In e-business development, semantics-oriented document exchange is becoming important, because it can support crossdomain user connection, business transaction and collaboration. ...
Jingzhi Guo, Ming Sang Ho
RE
2006
Springer
13 years 10 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RE
2004
Springer
14 years 3 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
NDSS
1997
IEEE
14 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
REFSQ
2010
Springer
13 years 12 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...