Sciweavers

378 search results - page 4 / 76
» Security requirement analysis of business processes
Sort
View
JCP
2006
98views more  JCP 2006»
13 years 7 months ago
Testing Event-Driven Business Processes
Today's business climate requires to constantly evolve IT strategies for responding to new opportunities or threats. While the fundamentals of IT -- reliability, availability,...
Josef Schiefer, Gerd Saurer, Alexander Schatten
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 5 days ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
ACSAC
1999
IEEE
13 years 12 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
IEEEARES
2008
IEEE
14 years 1 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
WER
2005
Springer
14 years 1 months ago
Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition
How business and software analysts explore, document, and negotiate requirements for enterprise systems is critical to the benefits their organizations will eventually derive. In t...
Zlatko Zlatev, Maya Daneva, Roel Wieringa