Security & BPM

This blog is concerned with Information Security and Business process management, and the integration of Security with BPM.

Wednesday, 20 October 2010


مرسلة بواسطة kHaLiD Alissa في 13:25
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Categories

  • Annotated bibliography (26)
  • Work done (19)
  • compliance (9)
  • Security policies (7)
  • Overview Security and BPM (6)
  • trust (5)
  • Integrating Security requirements in BPM (4)
  • General (3)
  • Security policy Languages (3)
  • significance (3)
  • BPM supporting Security (2)
  • trust definition (2)
  • BPM (1)
  • Security (1)
  • Workflow (1)
  • data (1)
  • plan (1)
  • summery (1)

About Me

kHaLiD Alissa
Brisbane, QLD, Australia
PhD student @ QUT Researching the integration of Security in BPM
View my complete profile

Blog Archive

  • ►  2011 (52)
    • ►  December (3)
    • ►  November (12)
    • ►  October (3)
    • ►  September (4)
    • ►  June (2)
    • ►  May (5)
    • ►  March (12)
    • ►  February (1)
    • ►  January (10)
  • ▼  2010 (44)
    • ►  December (8)
    • ►  November (14)
    • ▼  October (4)
      • Meting minutes 26-10
      • From the BPM Book ..
      • 1st month plan
    • ►  April (18)

Pages

  • Home
Simple theme. Powered by Blogger.