Sciweavers

378 search results - page 36 / 76
» Security requirement analysis of business processes
Sort
View
ICIAP
2007
ACM
15 years 10 months ago
Exploiting Temporal Statistics for Events Analysis and Understanding
In this paper, we propose a technique for detecting possible events in outdoor areas monitored by a video surveillance system. In particular, here we focus on the time spent by an...
Christian Micheloni, Lauro Snidaro, Claudio Piciar...
AINA
2004
IEEE
15 years 1 months ago
Analysis of Grid Service Composition with BPEL4WS
The Open Grid Services Infrastructure (OGSI) defines a distributed system framework by integrating Grid and Web services technologies to facilitate resource sharing. In OGSI, Web ...
Kuo-Ming Chao, Muhammad Younas, Nathan Griffiths, ...
KBSE
2007
IEEE
15 years 4 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ATAL
2003
Springer
15 years 3 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...