The difference between cyber security vs information security
The terms cyber security and information security are often used interchangeably, both in the
academic literature and by organizations. This article aimed to identify whether these terms …
academic literature and by organizations. This article aimed to identify whether these terms …
Leaving the Business Security Burden to LiSEA: A Low-Intervention Security Embedding Architecture for Business APIs
H Li, J Li, Y Wang, C Zhou, M Yin - Applied Sciences, 2023 - mdpi.com
In the evolving landscape of complex business ecosystems and their digital platforms, an
increasing number of business Application Programming Interfaces (APIs) are encountering …
increasing number of business Application Programming Interfaces (APIs) are encountering …
[图书][B] Securing Distributed Business Process Model Execution
MF Madsen - 2023 - pure.itu.dk
This PhD thesis investigates the secure execution of distributed business process models.
When collaborating actors use distributed process model execution to coordinate and …
When collaborating actors use distributed process model execution to coordinate and …
Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment
F Abdmeziem, S Boukhedouma… - … on Computational Science …, 2023 - Springer
Business processes are surely at the heart of companies but they are also the target of
numerous security attacks, especially when using nowadays technologies like Cloud …
numerous security attacks, especially when using nowadays technologies like Cloud …
Systematic Selection Of Threat Modeling Approaches
L Marck - 2024 - studenttheses.uu.nl
Threat modeling is a method for identifying and analyzing security problems early on in the
development life cycle. The infancy of the discipline, the absence of a shared scope, and …
development life cycle. The infancy of the discipline, the absence of a shared scope, and …