Sciweavers

378 search results - page 12 / 76
» Security requirement analysis of business processes
Sort
View
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
BPSC
2009
184views Business» more  BPSC 2009»
13 years 8 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
DAWAK
2007
Springer
14 years 1 months ago
OLAP Technology for Business Process Intelligence: Challenges and Solutions
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl
ICSE
2004
IEEE-ACM
14 years 7 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ACSAC
2001
IEEE
13 years 11 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott