Sciweavers

915 search results - page 26 / 183
» Security in Business Process Engineering
Sort
View
ISPW
2006
IEEE
15 years 3 months ago
Tailor the Value-Based Software Quality Achievement Process to Project Business Cases
This paper proposes a risk-based process strategy decision-making approach. To improve the flexibility in applying the Value-Based Software Quality Achievement (VBSQA) process fram...
LiGuo Huang, Hao Hu, JiDong Ge, Barry W. Boehm, Ji...
SACMAT
2010
ACM
15 years 2 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
15 years 4 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
AGILEDC
2007
IEEE
15 years 4 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
ICSEA
2007
IEEE
15 years 4 months ago
A Framework for Classifying and Comparing Process Technology Domains
This paper introduces a framework for classifying and comparing three domains related to the process technology. More particularly, it gives process definitions, characteristics, m...
Reda Bendraou, Marie-Pierre Gervais