Sciweavers

378 search results - page 65 / 76
» Security requirement analysis of business processes
Sort
View
JSS
2011
126views more  JSS 2011»
12 years 10 months ago
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems
Forecasting workflow activity durations is of great importance to support satisfactory QoS in workflow systems. Traditionally, a workflow system is often designed to facilitate the...
Xiao Liu, Zhiwei Ni, Dong Yuan, Yuan-Chun Jiang, Z...
DGO
2009
175views Education» more  DGO 2009»
13 years 8 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
SAFECOMP
2001
Springer
13 years 12 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu