Sciweavers

378 search results - page 24 / 76
» Security requirement analysis of business processes
Sort
View
IEEESCC
2007
IEEE
14 years 1 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
EDOC
2007
IEEE
14 years 1 months ago
An Analysis Framework for Mobile Workforce Automation
In this paper we introduce an analysis framework for mobile workforce automation. The framework is based on the findings from earlier research as well as on an analysis of 27 rec...
Volker Gruhn, André Köhler
ICSOC
2009
Springer
14 years 6 days ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
ICASSP
2011
IEEE
12 years 11 months ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu