Sciweavers

2504 search results - page 68 / 501
» Enterprise Security Architecture
Sort
View
ACSAC
1999
IEEE
15 years 4 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
APSEC
2003
IEEE
15 years 5 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
IEEESCC
2007
IEEE
15 years 6 months ago
A Framework for Assessing Business Value of Service Oriented Architectures
—This paper presents a framework used for analyzing decisions regarding implementations of service oriented architectures. The framework assesses the business value of SOA by mea...
Robert Lagerström, Jonas Ohrstrom
CCS
2007
ACM
15 years 6 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
NOMS
2000
IEEE
15 years 4 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt