Sciweavers

8623 search results - page 184 / 1725
» Software engineering for secure systems
Sort
View
COMPSAC
2002
IEEE
14 years 2 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
TES
2001
Springer
14 years 2 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
CASES
2009
ACM
14 years 4 months ago
Negotiation of security services: a multi-criteria decision approach
Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ICSE
2000
IEEE-ACM
14 years 1 months ago
Requirements engineering: a roadmap
This paper presents an overview of the field of software systems requirements engineering (RE). It describes the main areas of RE practice, and highlights some key open research i...
Bashar Nuseibeh, Steve M. Easterbrook