1
Kay Schwendimann Anderson, Pau Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner: System and method for security planning with soft security constraints. International Business Machines Corporation, William J Stock, F Chau & Associates, March 6, 2012: US08132259 (3 worldwide citation)

A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at le ...


2
Kay Schwendimann Anderson, Pau Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner: System and method for security planning with soft security constraints. Frank Chau Esq, F Chau & Associates, July 10, 2008: US20080168529-A1

A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at le ...