![]() ; Hermann, Frank ![]() ![]() in Enterprise Distributed Object Computing Conference Workshops, 2009. EDOCW 2009. 13th, Proc. International Workshop on Dynamic and Declarative Business Processes (DDBP 2009) (2009) Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance ... [more ▼] Critical business processes can fail. Therefore, continuity processes are needed as backup solutions. At the same time business processes are required to comply with security, risk and compliance requirements. In the context discussed here, they should be modeled in a decentralized local and declarative way, including methodological support by tools. By discussing a simplified loan granting process in the context of a Business Continuity Management System at Credit Suisse, we show how algebraic graph transformation can contribute a methodologically sound solution being compatible with all these requirements in a coherent way. As a consequence significant benefits of automation and quality can be realized. The presented contribution is theoretically sound and implementable by the people in the field. [less ▲] Detailed reference viewed: 166 (3 UL)![]() Becker, Sheila ![]() ![]() ![]() in The 11th IFIP/IEEE International Symposium on Integrated Network Management (2009) Detailed reference viewed: 110 (1 UL)![]() ![]() Frank, Raphaël ![]() ![]() ![]() in Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications (2008) Detailed reference viewed: 150 (3 UL)![]() ![]() Frank, Raphaël ![]() ![]() ![]() in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (2008) Detailed reference viewed: 126 (3 UL)![]() ![]() Fusenig, Volker ![]() ![]() ![]() in Privacy, Security and Trust, 2008. PST '08. Sixth Annual Conference on (2008) In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee ... [more ▼] In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols either do not guarantee unlinkability (e.g. Tor and Mix networks), or produce huge overhead -- the dining cryptographers network causes quadratic number of messages. Our protocol needs only a linear number of messages while it still guarantees unlinkability. We introduce a measure of unlinkability and show that our protocol offers the highest possible degree of unlinkability. We show how to use the protocol in practice by adapting it to internet and ad hoc communication. [less ▲] Detailed reference viewed: 159 (1 UL)![]() ![]() Frank, Raphaël ![]() ![]() in Proceedings of the 14th Annual Conference on Disaster Recovery And Relief, Current & Future Approaches (2007) Detailed reference viewed: 93 (9 UL) |
||