Sciweavers

378 search results - page 1 / 76
» Security requirement analysis of business processes
Sort
View
ECR
2006
52views more  ECR 2006»
13 years 4 months ago
Security requirement analysis of business processes
Peter Herrmann, Gaby Herrmann
CAISE
2008
Springer
13 years 6 months ago
Business Process Modelling and Purpose Analysis for Requirements Analysis of Information Systems
Although requirements analysis is acknowledged as a critical success factor of information system development for organizations, problems related to the requirements stage are freq...
José Luis de la Vara, Juan Sánchez, ...
IFIP
2009
Springer
13 years 2 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
BPSC
2009
190views Business» more  BPSC 2009»
13 years 5 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
CAISE
2010
Springer
12 years 11 months ago
Configuring the Variability of Business Process Models Using Non-Functional Requirements
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...
Emanuel Santos, João Pimentel, Jaelson Cast...