Sciweavers

506 search results - page 9 / 102
» Electronic-internet business and security
Sort
View
WECWIS
2005
IEEE
131views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures
Virtual Enterprises or Organisations (VO) have
Adomas Svirskas, Michael D. Wilson, Alvaro E. Aren...
EDOC
2007
IEEE
15 years 3 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama
SACMAT
2003
ACM
15 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 3 months ago
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy...
62
Voted
ICSOC
2007
Springer
15 years 3 months ago
Goal-Equivalent Secure Business Process Re-engineering
Hugo A. López, Fabio Massacci, Nicola Zanno...