Sciweavers

153 search results - page 15 / 31
» Balancing Flexibility and Security in Adaptive Process Manag...
Sort
View
CCS
2007
ACM
15 years 3 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
ESORICS
2009
Springer
15 years 10 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
MKWI
2008
246views Business» more  MKWI 2008»
14 years 11 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
ICEIS
2007
IEEE
15 years 1 months ago
Case Handling Systems as Product Based Workflow Design Support
Case handling systems offer a solution to the lack of flexibility and adaptability in workflow management systems. Because they are data driven they potentially provide good suppor...
Irene T. P. Vanderfeesten, Hajo A. Reijers, Wil M....
ECUMN
2007
Springer
15 years 3 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...