Sciweavers

915 search results - page 88 / 183
» Security in Business Process Engineering
Sort
View
DOCENG
2010
ACM
14 years 8 months ago
Semantics-enriched document exchange
In e-business development, semantics-oriented document exchange is becoming important, because it can support crossdomain user connection, business transaction and collaboration. ...
Jingzhi Guo, Ming Sang Ho
RE
2006
Springer
14 years 9 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
RE
2004
Springer
15 years 3 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
NDSS
1997
IEEE
15 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
REFSQ
2010
Springer
14 years 11 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...