Sciweavers

378 search results - page 6 / 76
» Security requirement analysis of business processes
Sort
View
IJSTM
2000
117views more  IJSTM 2000»
13 years 7 months ago
Architectural design support for business process and business network engineering
Abstract: Concurrent enterprises and networks of business processes cannot function without each other. Cooperation in networks allows for faster reaction to business opportunities...
Henry M. Franken, René Bal, Harmen van den ...
CCS
2003
ACM
14 years 23 days ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
EDOC
2003
IEEE
14 years 25 days ago
An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises
As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
Jun-Jang Jeng, Josef Schiefer, Henry Chang
EKNOW
2010
13 years 2 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
JTAER
2008
100views more  JTAER 2008»
13 years 7 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni