Sciweavers

378 search results - page 38 / 76
» Security requirement analysis of business processes
Sort
View
ISI
2005
Springer
14 years 1 months ago
Integrating Private Databases for Data Analysis
In today’s globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate the...
Ke Wang, Benjamin C. M. Fung, Guozhu Dong
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 2 months ago
Multidimensional Analysis of RFID Data in Logistics
In the domain of logistics, Radio Frequency Identification (RFID) promises a plethora of benefits due to an enhanced efficiency, accuracy, and preciseness of object identification...
Henning Baars, Xuanpu Sun
WSC
2000
13 years 9 months ago
Product-mix analysis with Discrete Event Simulation
Discrete Event Simulation (DES) has been used as a design and validation tool in various production and business applications. DES can also be utilized for analyzing the product-m...
Raid Al-Aomar
SEKE
2004
Springer
14 years 1 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
INFSOF
2007
83views more  INFSOF 2007»
13 years 7 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams