You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
This book constitutes the refereed proceedings of the 13th European Conference on Software Architecture, ECSA 2019, held in Paris, France, in September 2019. In the Research Track, 11 full papers presented together with 4 short papers were carefully reviewed and selected from 63 submissions. They are organized in topical sections as follows: Services and Micro-services, Software Architecture in Development Process, Adaptation and Design Space Exploration, and Quality Attributes. In the Industrial Track, 6 submissions were received and 3 were accepted to form part of these proceedings.
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.
None
This important, self-contained reference deals with structural life assessment (SLA) and structural health monitoring (SHM) in a combined form. SLA periodically evaluates the state and condition of a structural system and provides recommendations for possible maintenance actions or the end of structural service life. It is a diversified field and relies on the theories of fracture mechanics, fatigue damage process, and reliability theory. For common structures, their life assessment is not only governed by the theory of fracture mechanics and fatigue damage process, but by other factors such as corrosion, grounding, and sudden collision. On the other hand, SHM deals with the detection, prediction, and location of crack development online. Both SLA and SHM are combined in a unified and coherent treatment.
In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
This book describes the current innovative tendencies characteristic of multifaceted scientific research and practical developments in the field of international business development and sustainable management. This book shows how companies are forced to change development strategies and business models, which actualizes new priorities for scientific research in the field of international business and sustainable management. Therefore, completely new subject areas of research are being formed; management guidelines are being transformed; new business development tools are being developed; the very system of academic research is changing. This book “Innovative Trends in International Busine...