Sciweavers

372 search results - page 18 / 75
» A Reference Model for Firewall Technology
Sort
View
BPM
2005
Springer
85views Business» more  BPM 2005»
14 years 1 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...
IAJIT
2010
133views more  IAJIT 2010»
13 years 6 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
EMISA
2009
Springer
14 years 2 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...
WWW
2006
ACM
14 years 8 months ago
An ontology for internal and external business processes
In this paper we introduce our multi metamodel process ontology (m3po), which is based on various existing reference models and languages from the workflow and choreography domain...
Armin Haller, Eyal Oren, Paavo Kotinurmi