Sciweavers

506 search results - page 20 / 102
» Electronic-internet business and security
Sort
View
ICST
2009
IEEE
15 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
76
Voted
CIDM
2009
IEEE
15 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ATAL
2008
Springer
14 years 11 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...
CIMCA
2008
IEEE
15 years 4 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 1 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky