Sciweavers

375 search results - page 66 / 75
» ADEPT: An Agent-Based Approach to Business Process Managemen...
Sort
View
EMISA
2006
Springer
14 years 8 days ago
On Design Principles for Realizing Adaptive Service Flows with BPEL
Abstract: Web service technology offers a promising approach for realizing enterprisewide and cross-organizational business applications. With the Business Process Execution Langua...
Manfred Reichert, Stefanie Rinderle
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 11 days ago
Re-thinking Enrolment in Identity Card Schemes
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...
Ali M. Al-Khouri
JBCS
2010
152views more  JBCS 2010»
13 years 7 months ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...