Sciweavers

575 search results - page 23 / 115
» A model for evaluating IT security investments
Sort
View
IEEEARES
2006
IEEE
15 years 8 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
SIGSOFT
2005
ACM
16 years 2 months ago
The story of moose: an agile reengineering environment
Moose is a language-independent environment for reverseand re-engineering complex software systems. Moose provides a set of services including a common meta-model, metrics evaluat...
Oscar Nierstrasz, Stéphane Ducasse, Tudor G...
EMISA
2005
Springer
15 years 7 months ago
An Approach to quantify the Costs of Business Process Intelligence
: Today, enterprises are forced to continuously optimize their business as well as service processes. In this context the process-centered alignment of information systems is cruci...
Bela Mutschler, Johannes Bumiller, Manfred Reicher...
IVA
2010
Springer
15 years 10 days ago
An Intelligent Virtual Agent to Increase Involvement in Financial Services
In order to enhance user involvement in financial services, this paper proposes to combine the idea of adaptive personalisation with intelligent virtual agents. To this end, a comp...
Tibor Bosse, Ghazanfar F. Siddiqui, Jan Treur
98
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...