Auflistung nach Autor:in "Gilliot, Maike"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelDie SIKOSA-Methodik(Wirtschaftsinformatik: Vol. 49, No. 3, 2007) Weiß, Daniel; Kaack, Jörn; Kirn, Stefan; Gilliot, Maike; Lowis, Lutz; Müller, Günter; Herrmann, Andrea; Binnig, Carsten; Illes, Timea; Paech, Barbara; Kossmann, DonaldKernpunkteDie SIKOSA-Methodik beschreibt einen durchgängigen Lösungsansatz zur Softwareentwicklung.Die Methodik überführt funktionale und nicht funktionale Prozessanforderungen in entsprechende testbare Unternehmenssoftware-Anforderungen und erhöht die Validität.Die Methodik wird vor dem Hintergrund eines industriellen Beschaffungsprozesses veranschaulicht.AbstractThe SIKOSA method addresses the consistency of quality assuring methods in software engineering processes. To support an industrial business software production a new consistent and quality-oriented method was developed. Regarding business processes, which have to be supported, functional and non-functional requirements of business software are specified and transferred into automated test cases and test data.
- KonferenzbeitragExtended privacy definition tool(PRIMIUM - Process Innovation for Enterprise Software, 2009) Kähmer, Martin; Gilliot, MaikeEliciting non-functional security requirements within a company was one of the major aspects of the SIKOSA project1. Scenarios, such as that of METRO presented in this paper, show how besides a company's internal requirements, customers' preferences also play an important role. However, conflicts between specific customers' privacy policies and those of a company need to be detected and dealt with. To this end we present a policy language that is able to tackle this comparison problem and two tools: An editor tool allowing users to specify their policies in a user-friendly way and a monitoring tool to evaluate und enforce the policies at runtime.
- KonferenzbeitragVulnerability Effect Propagation in Service-Oriented Architectures(SICHERHEIT 2008 – Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2008) Lowis, Lutz; Höhn, Sebastian; Gilliot, MaikeSoftware vulnerabilities put automated business processes at risk. In service- oriented architectures (SOA), where business processes are implemented as potentially highly complex service compositions, the exploit of a software vulnerability can have far reaching effects on the confidentiality, integrity, and availability of business processes. In this paper, we report on our ongoing work which combines business process models with vulnerability information to automatically determine those effects. This determination is required in the identification phase in risk management.