Abstract
This article introduces POSeM, a method that uses business process descriptions to derive appropriate security safeguards. This is achieved by assigning security levels to the components of a busin...
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have