Sciweavers

378 search results - page 43 / 76
» Security requirement analysis of business processes
Sort
View
EUROPAR
2007
Springer
14 years 1 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
JUCS
2010
159views more  JUCS 2010»
13 years 2 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CIBSE
2009
ACM
14 years 2 months ago
A Domain Specific Language to Generate Web Applications
Nowadays building a web application is still a complex process that requires a big effort to get several tasks done. This article presents a domain specific language aimed to simpl...
Juan José Cadavid, Juan Bernardo Quintero, ...
CAISE
1999
Springer
13 years 12 months ago
Modeling Dynamic Domains with ConGolog
In this paper, we describe the process specification language ConGolog and show how it can be used to model business processes for requirements analysis. In ConGolog, the effects...
Yves Lespérance, Todd G. Kelley, John Mylop...