- Full text PDF available (4)
In this work we look into the domain of process security from a service perspective. Most often process security has been enacted through service level agreements (SLA) and business agreements. However, in a multi-party environment such as business process outsourcing (BPO) where processes themselves are offered as a service, the qualitative nature of SLA… (More)
Security policy satisfiability and high failure resilience (i.e. survivabil-ity) are desirable properties of every system. Security issues and failure resilience are usually treated in stand alone mode and not in synergy. In this paper, we bridge this gap for workflows. We propose techniques which ensure that user-task assignment is both secure and failure… (More)
Shortest path computation has always been a subject of study and research in the history of computer science. In this paper we introduce and initiate the study of the problem of finding the shortest path in a privacy preserving manner, in presence of single convex polygonal obstacle. We also propose an efficient, elegant and simple solution for the problem.
Information security is important in proportion to an organization's dependence on information technology. Security of a computer based information system should protect the Confidentiality, Integrity and Availability (CIA) aspects of the system. With the increasing dependence of business processes on information technology, the number of attacks against… (More)
Binding of Ag by B cells leads to signal transduction downstream of the BCR and to delivery of the internalized Ag-BCR complex to lysosomes where the Ag is processed and presented on MHC class II molecules. T cells that recognize the peptide-MHC complexes provide cognate help to B cells in the form of costimulatory signals and cytokines. Recruitment of T… (More)