Sciweavers

378 search results - page 14 / 76
» Security requirement analysis of business processes
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 2 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 2 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
VLDB
2007
ACM
112views Database» more  VLDB 2007»
14 years 1 months ago
A Generic solution for Warehousing Business Process Data
Improving business processes is critical to any corporation. Process improvement requires analysis as its first basic step. Process analysis has many unique challenges: i) compani...
Fabio Casati, Malú Castellanos, Umeshwar Da...
ISPASS
2005
IEEE
14 years 1 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...
BPM
2007
Springer
155views Business» more  BPM 2007»
14 years 1 months ago
Business Process Simulation for Operational Decision Support
Contemporary business process simulation environments are geared towards design-time analysis, rather than operational decision support over already deployed and running processes....
Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Ar...