Sciweavers

378 search results - page 33 / 76
» Security requirement analysis of business processes
Sort
View
HICSS
2012
IEEE
323views Biometrics» more  HICSS 2012»
12 years 3 months ago
The Manufacture of Potable Water: Case Analyses of Electric System Alternatives
Potable water within significant areas of the nations of the Arabian Gulf region is most frequently manufactured (cogenerated) along with electricity. The most economic process ha...
Richard D. Tabors, Siddarth Nagendraprasad, Ayoob ...
UML
2005
Springer
14 years 1 months ago
Dynamic Secure Aspect Modeling with UML: From Models to Code
Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticip...
Jan Jürjens, Siv Hilde Houmb
ACSAC
1999
IEEE
13 years 12 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ESWA
2011
220views Database» more  ESWA 2011»
12 years 11 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
IEEEARES
2010
IEEE
13 years 12 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch