Sciweavers

27 search results - page 6 / 6
» Checking ownership and confinement
Sort
View
ESOP
2005
Springer
13 years 10 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
BPM
2008
Springer
217views Business» more  BPM 2008»
13 years 7 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...