Sciweavers

263 search results - page 36 / 53
» Applying the Semantic Web Layers to Access Control
Sort
View
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
ICWS
2008
IEEE
13 years 10 months ago
Generalized Semantics-Based Service Composition
Service-oriented computing (SOC) has emerged as the eminent market environment for sharing and reusing service-centric capabilities. The underpinning for an organization's us...
Srividya Kona, Ajay Bansal, M. Brian Blake, Gopal ...
BPM
2006
Springer
149views Business» more  BPM 2006»
13 years 11 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
FUIN
2008
116views more  FUIN 2008»
13 years 9 months ago
On the Relationship between Description Logic-based and F-Logic-based Ontologies
Many popular ontology languages are based on (subsets of) first-order predicate logic, with classes represented by unary predicates and properties by binary predicates. Specificall...
Jos de Bruijn, Stijn Heymans
ENTCS
2007
101views more  ENTCS 2007»
13 years 9 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts