Sciweavers

319 search results - page 26 / 64
» An access control framework for business processes for web s...
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
BPM
2006
Springer
128views Business» more  BPM 2006»
13 years 10 months ago
Towards Formal Verification of Web Service Composition
Abstract. Web services composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Current Web services composition propos...
Mohsen Rouached, Olivier Perrin, Claude Godart
SOCA
2010
IEEE
13 years 6 months ago
Exploiting multicores to optimize business process execution
While modern CPUs offer an increasing number of cores with shared caches, prevailing execution engines for business processes, workflows, or Web service compositions have not been ...
Achille Peternier, Daniele Bonetta, Cesare Pautass...
IJAMC
2007
114views more  IJAMC 2007»
13 years 8 months ago
Integration of rules and policies for Semantic Web Services
: Multimedia service providers on the web need their services to be well protected and easily accessible worldwide. This has initiated several lines of research to provide semantic...
Nima Kaviani, Dragan Gasevic, Marek Hatala, David ...
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 10 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl