Sciweavers

378 search results - page 15 / 76
» Security requirement analysis of business processes
Sort
View
AOSD
2004
ACM
14 years 1 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
RE
2010
Springer
13 years 2 months ago
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study
Companies in the software business often distribute requirements engineering responsibilities over several roles. Product management has overall product responsibility and performs...
Samuel Fricker, Martin Glinz
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
14 years 28 days ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
WSC
2000
13 years 9 months ago
Applications of business process simulation and lean techniques in British Telecommunications PLC
Business processes are increasingly key to the success of companies in the service industry. It is important that these processes are designed and maintained to deliver the most c...
Simon Dennis, Ben C. King, Martin Hind, Stewart Ro...
BPM
2005
Springer
85views Business» more  BPM 2005»
14 years 1 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...