Sciweavers

506 search results - page 11 / 102
» Electronic-internet business and security
Sort
View
SECURWARE
2007
IEEE
15 years 3 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
CSUR
2010
200views more  CSUR 2010»
14 years 6 months ago
Business process modeling languages: Sorting through the alphabet soup
Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric...
GIL
2011
13 years 9 months ago
Business Process Support using RFID-based Information Services in the Distribution of Fresh Fruits and Vegetables
: The efficient distribution of fresh produce poses many challenges to enterprises in the fruit and vegetable sector. The exchange of product- and processrelated information betwee...
Robert Reiche, Richard J. Lehmann, Melanie Fritz, ...
BIRTHDAY
2010
Springer
14 years 8 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 3 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen