- Full text PDF available (4)
- This year (0)
- Last five years (0)
Eliciting non-functional security requirements within ac ompanyw as one of the major aspects of the SIKOSA project 1 .S cenarios, such as that of METRO presented in this paper,s howh ow besides ac ompany'si nternal requirements, cus-tomers' preferences also play an important role. However, conflicts between specific customers' privacy policies and those of… (More)
in denen mehrere Dienstleister in der Soft-wareerstellungsprozesskette zusammenar-& Die Methodik wird vor dem Hintergrund eines industriellen Beschaffungsprozesses ver-anschaulicht.
While obligations are essential to capture privacy and usage policies, they cannot be enforced by traditional reference monitors. We present a monitor architecture to anticipate policy violations based on Runtime Verification and on statistical knowledge about the outcome of previous executions. By monitoring the progress of processes, in particular their… (More)