-
2
-
-
77957994724
-
-
version 2.0 January (May 19, 2011)
-
Business process model and notation (bpmn) version 2.0 (January 2011), http://www.omg.org/spec/BPMN/2.0 (May 19, 2011)
-
(2011)
Business Process Model and Notation (bpmn)
-
-
-
3
-
-
0036680316
-
Abstracting soft constraints: Framework, properties, examples
-
Bistarelli, S., Codognet, P., Rossi, F.: Abstracting soft constraints: Framework, properties, examples. Artificial Intelligence 139, 175-211 (2002)
-
(2002)
Artificial Intelligence
, vol.139
, pp. 175-211
-
-
Bistarelli, S.1
Codognet, P.2
Rossi, F.3
-
4
-
-
0031095278
-
Semiring-based constraint satisfaction and optimizatio
-
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimizatio. Journal of ACM 44(2), 201-236 (1997)
-
(1997)
Journal of ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
5
-
-
70849094182
-
An ahp-based framework for quality and security evaluation
-
Casola, V., Fasolino, A.R.,Mazzocca, N., Tramontana, P.: An ahp-based framework for quality and security evaluation. In: Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE, Los Alamitos (2009)
-
Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE, Los Alamitos (2009)
-
-
Casola, V.1
Fasolino, A.R.2
Mazzocca, N.3
Tramontana, P.4
-
6
-
-
84882690392
-
A SLA evaluation methodology in Service Oriented Architectures
-
Springer, Heidelberg
-
Casola, V., Mazzeo, A., Mazzocca, N., Rak, M.: A SLA evaluation methodology in Service Oriented Architectures. In: Quality of Protection, Part 3. Advances in Information Security, vol. 23, pp. 119-130. Springer, Heidelberg (2005)
-
(2005)
Quality of Protection, Part 3. Advances in Information Security
, vol.23
, pp. 119-130
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Rak, M.4
-
7
-
-
80054079151
-
-
Technical Report RC23872, IBM July
-
Cheng, F., Gamarnik, D., Jengte, N., Min, W., Ramachandran, B.: Modelling operational risks in business process. Technical Report RC23872, IBM (July 2005)
-
(2005)
Modelling Operational Risks in Business Process
-
-
Cheng, F.1
Gamarnik, D.2
Jengte, N.3
Min, W.4
Ramachandran, B.5
-
8
-
-
57049173095
-
Security provisioning in pervasive environments using multi-objective optimization
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Dewri, R., Ray, I., Ray, I., Whitley, D.: Security provisioning in pervasive environments using multi-objective optimization. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 349-363. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 349-363
-
-
Dewri, R.1
Ray, I.2
Ray, I.3
Whitley, D.4
-
9
-
-
34147120474
-
A note on two problems in connexion with graphs
-
Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1(1), 269-271 (1959)
-
(1959)
Numerische Mathematik
, vol.1
, Issue.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
12
-
-
34250776507
-
Security and trust in it business outsourcing: A manifesto
-
Karabulut, Y., Kerschbaum, F., Robinson, P., Massacci, F., Yautsiukhin, A.: Security and trust in it business outsourcing: a manifesto. Electronic Notes in Theoretical Computer Science 179, 47-58 (2006)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.179
, pp. 47-58
-
-
Karabulut, Y.1
Kerschbaum, F.2
Robinson, P.3
Massacci, F.4
Yautsiukhin, A.5
-
13
-
-
77952604450
-
Risk-based usage control for service oriented architecture
-
Krautsevich, L., Lazouski, A., Martinelli, F., Yautsiukhin, A.: Risk-based usage control for service oriented architecture. In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-Based Processing. IEEE, Los Alamitos (2010)
-
Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-Based Processing. IEEE, Los Alamitos (2010)
-
-
Krautsevich, L.1
Lazouski, A.2
Martinelli, F.3
Yautsiukhin, A.4
-
14
-
-
78149373146
-
Formal approach to security metrics.: What does "more secure" mean for you?
-
Krautsevich, L., Martinelli, F., Yautsiukhin, A.: Formal approach to security metrics.: what does "more secure" mean for you? In: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. ACM, New York (2010)
-
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. ACM, New York (2010)
-
-
Krautsevich, L.1
Martinelli, F.2
Yautsiukhin, A.3
-
15
-
-
79958775085
-
Formal analysis of security metrics and risk
-
Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. Springer, Heidelberg
-
Krautsevich, L., Martinelli, F., Yautsiukhin, A.: Formal analysis of security metrics and risk. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 304-319. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6633
, pp. 304-319
-
-
Krautsevich, L.1
Martinelli, F.2
Yautsiukhin, A.3
-
20
-
-
0141425904
-
Semiring frameworks and algorithms for shortest-distance problems
-
Mohri, M.: Semiring frameworks and algorithms for shortest-distance problems. Journal of Automata, Languages and Combinatorics 7(3), 321-350 (2002)
-
(2002)
Journal of Automata, Languages and Combinatorics
, vol.7
, Issue.3
, pp. 321-350
-
-
Mohri, M.1
|