Sciweavers

378 search results - page 10 / 76
» Security requirement analysis of business processes
Sort
View
EUROSPI
2005
Springer
14 years 1 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
RE
2004
Springer
14 years 27 days ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ESWS
2008
Springer
13 years 8 months ago
A Core Ontology for Business Process Analysis
Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organisations. An important step of the BPM life-cy...
Carlos Pedrinaci, John Domingue, Ana Karla Alves d...
ER
2007
Springer
142views Database» more  ER 2007»
14 years 1 months ago
Multidimensional Data Modeling for Business Process Analysis
The emerging area of business process intelligence attempts to enhance the analytical capabilities of business process management systems by employing data warehousing and mining t...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 9 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...