Sciweavers

378 search results - page 36 / 76
» Security requirement analysis of business processes
Sort
View
ICIAP
2007
ACM
14 years 7 months ago
Exploiting Temporal Statistics for Events Analysis and Understanding
In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...
AINA
2004
IEEE
13 years 11 months ago
Analysis of Grid Service Composition with BPEL4WS
The Open Grid Services Infrastructure (OGSI) defines a distributed system framework by integrating Grid and Web services technologies to facilitate resource sharing. In OGSI, Web ...
Kuo-Ming Chao, Muhammad Younas, Nathan Griffiths, ...
KBSE
2007
IEEE
14 years 1 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ATAL
2003
Springer
14 years 26 days ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
ACSAC
2002
IEEE
14 years 18 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...