Sciweavers

378 search results - page 18 / 76
» Security requirement analysis of business processes
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Privacy Requirements Implemented with a JavaCard
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
Anas Abou El Kalam, Yves Deswarte
FASE
2008
Springer
13 years 9 months ago
Correctness-Preserving Configuration of Business Process Models
Abstract. Reference process models capture recurrent business operations in a given domain such as procurement or logistics. These models are intended to be configured to fit the r...
Wil M. P. van der Aalst, Marlon Dumas, Florian Got...
BPM
2005
Springer
173views Business» more  BPM 2005»
14 years 1 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar
BPM
2010
Springer
163views Business» more  BPM 2010»
13 years 8 months ago
Self-adjusting Recommendations for People-Driven Ad-Hoc Processes
Abstract. A company's ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in peopledriven processes i...
Christoph Dorn, Thomas Burkhart, Dirk Werth, Schah...
ICSEA
2007
IEEE
14 years 1 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su