Sciweavers

378 search results - page 60 / 76
» Security requirement analysis of business processes
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
13 years 11 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ECIS
2004
13 years 9 months ago
Decoupling Application Roles and Technology Generations: A Life-Cycle Approach
Companies invest large amounts of money in new technologies. Not surprisingly, much of the research carried out in relation to IT-investments has focused on the adoption of new te...
Anders Mårtensson, Pablo Valiente
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
DEXA
2005
Springer
148views Database» more  DEXA 2005»
14 years 1 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
GEOS
2007
Springer
14 years 1 months ago
Supporting Complex Thematic, Spatial and Temporal Queries over Semantic Web Data
Spatial and temporal data are critical components in many applications. This is especially true in analytical domains such as national security and criminal investigation. Often, t...
Matthew Perry, Amit P. Sheth, Farshad Hakimpour, P...