-
1
-
-
33644538463
-
Specification and verification of secure business transaction systems
-
Proceedings of the SOFSEM'2002
-
V.S. Alagar, K. Periyasamy, Specification and verification of secure business transaction systems, in: Proceedings of the SOFSEM'2002, Lecture Notes in Computer Science 2540 (2002) 240-252.
-
(2002)
Lecture Notes in Computer Science
, vol.2540
, pp. 240-252
-
-
Alagar, V.S.1
Periyasamy, K.2
-
4
-
-
33644553339
-
Security in business process engineering
-
Proceedings of the BPM'2003
-
M. Backes, B. Pfitzmann, M. Waidner, Security in business process engineering, in: Proceedings of the BPM'2003, Lecture Notes in Computer Science 2678 (2003) 168-183.
-
(2003)
Lecture Notes in Computer Science
, vol.2678
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
6
-
-
27944453007
-
Security integration in inter-enterprise business process engineering
-
H.S. Jagdev J.C. Wortmann H.J. Pels Kluwer Academic Publishers
-
F. Biennier Security integration in inter-enterprise business process engineering H.S. Jagdev J.C. Wortmann H.J. Pels Collaborative Systems for Production Management 2002 Kluwer Academic Publishers 207 218
-
(2002)
Collaborative Systems for Production Management
, pp. 207-218
-
-
Biennier, F.1
-
7
-
-
84902485471
-
Collaborative BP engineering in alliances of SMEs
-
L. Camarinha-Matos H. Afsarmanesh Kluwer Academic Publishers
-
F. Biennier, and J. Favrel Collaborative BP engineering in alliances of SMEs L. Camarinha-Matos H. Afsarmanesh Processes and Foundations for Virtual Organizations 2002 Kluwer Academic Publishers 441 448
-
(2002)
Processes and Foundations for Virtual Organizations
, pp. 441-448
-
-
Biennier, F.1
Favrel, J.2
-
8
-
-
0036713721
-
The application of workflow technology in semantic B2B integration
-
C. Bussler The application of workflow technology in semantic B2B integration Distributed and Parallel Databases 12 2002 163 191
-
(2002)
Distributed and Parallel Databases
, vol.12
, pp. 163-191
-
-
Bussler, C.1
-
9
-
-
0034165704
-
Modelling and managing interactions among business processes
-
F. Cassati, and A. Discenza Modelling and managing interactions among business processes Journal of Systems Integration 10 2001 145 168
-
(2001)
Journal of Systems Integration
, vol.10
, pp. 145-168
-
-
Cassati, F.1
Discenza, A.2
-
10
-
-
33644556378
-
Language for Description and Functionnal Specification (SDL)
-
vol. VI.10 Advices Z.100 to Z.104
-
CCITT Red Book, vol. VI.10, Language for Description and Functionnal Specification (SDL), Advices Z.100 to Z.104, 1985.
-
(1985)
CCITT Red Book
-
-
-
11
-
-
84888789125
-
Trusted computer security evaluation criteria-orange book
-
Department of Defence (DoD), Trusted Computer Security Evaluation Criteria-Orange Book, DOD 5200.28-STD Report, 1985.
-
(1985)
DOD 5200.28-STD Report
-
-
-
16
-
-
0030408473
-
Security issues in the virtual corporation
-
R.L. Franck Security issues in the virtual corporation Computers and Security 15 1996 471 476
-
(1996)
Computers and Security
, vol.15
, pp. 471-476
-
-
Franck, R.L.1
-
17
-
-
84888793930
-
-
1998 Report
-
FTC (Federal Trade Commission), Privacy online: a report to Congress, 1998 Report, 1998. Available at http://www.ftc.gov/reports/privacy3/priv-23.htm.
-
(1998)
Privacy Online: A Report to Congress
-
-
-
19
-
-
0036779153
-
AutoWF - A secure web workflow system using autonomous objects
-
E. Gudes, and A. Tubman AutoWF - a secure web workflow system using autonomous objects Data and Knowledge Engineering 43 2002 1 27
-
(2002)
Data and Knowledge Engineering
, vol.43
, pp. 1-27
-
-
Gudes, E.1
Tubman, A.2
-
21
-
-
79955163100
-
UMLsec: Extending uml for secure systems development
-
Proceedings of the UML'2002
-
J. Jürjens, UMLsec: extending uml for secure systems development, in: Proceedings of the UML'2002, Lecture Notes in Computer Science 2460 (2002) 412-425.
-
(2002)
Lecture Notes in Computer Science
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
22
-
-
0030708384
-
The ISSO must understand the business and management environment
-
G. Kovacich The ISSO must understand the business and management environment Computer and security 16 1997 321 326
-
(1997)
Computer and Security
, vol.16
, pp. 321-326
-
-
Kovacich, G.1
-
24
-
-
0034318674
-
The application of security policy to role-based access control and the common data security architecture
-
A. Lin, and R. Brown The application of security policy to role-based access control and the common data security architecture Communication 23 2000 1584 1593
-
(2000)
Communication
, vol.23
, pp. 1584-1593
-
-
Lin, A.1
Brown, R.2
-
25
-
-
0001794821
-
Is empowerment just a fad ? Control, decision making and IT
-
T.W. Malone Is empowerment just a fad ? Control, decision making and IT Sloan Management Review 1997 23 35
-
(1997)
Sloan Management Review
, pp. 23-35
-
-
Malone, T.W.1
-
27
-
-
33644537557
-
Structured risk analysis
-
Proceedings of the InfraSec'2002
-
N. Mc Evoy, A. Whitcombe, Structured risk analysis, in: Proceedings of the InfraSec'2002, Lecture Notes in Computer Science 2437 (2002) 88-103.
-
(2002)
Lecture Notes in Computer Science
, vol.2437
, pp. 88-103
-
-
Mc Evoy, N.1
Whitcombe, A.2
-
28
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B.C. Neuman, and T. Ts'o Kerberos: an authentication service for computer networks IEEE Communications 32 9 1994 33 38
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
29
-
-
0347622255
-
Web services and business transactions. World Wide Web
-
M.P. Papazoglou Web services and business transactions. World Wide Web Internet and Web Information Systems 6 2003 49 91
-
(2003)
Internet and Web Information Systems
, vol.6
, pp. 49-91
-
-
Papazoglou, M.P.1
-
32
-
-
84888785339
-
-
US Department of Commerce, Safe Harbor Workbook 2003, Available at http://www.export.gov/safeharbor/sh_workbook.html.
-
Safe Harbor Workbook 2003
-
-
|