Sciweavers

2422 search results - page 88 / 485
» Composition of Services with Constraints
Sort
View
CCS
2006
ACM
14 years 26 days ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
CP
2009
Springer
14 years 9 months ago
Modelling Equidistant Frequency Permutation Arrays: An Application of Constraints to Mathematics
Equidistant Frequency Permutation Arrays are combinatorial objects of interest in coding theory. A frequency permutation array is a type of constant composition code in which each ...
Sophie Huczynska, Paul McKay, Ian Miguel, Peter Ni...
SARA
2009
Springer
14 years 3 months ago
Modelling Equidistant Frequency Permutation Arrays in Constraints
Equidistant Frequency Permutation Arrays are combinatorial objects of interest in coding theory. A frequency permutation array is a type of constant composition code in which each...
Ian P. Gent, Paul McKay, Ian Miguel, Peter Nightin...
ER
2009
Springer
92views Database» more  ER 2009»
14 years 3 months ago
From User Goals to Service Discovery and Composition
Goals are often used to represent stakeholder’s objectives. The intentionality inherited by a goal drives stakeholders to pursuit the fulfillment of their goals either by themse...
Luiz Olavo Bonino da Silva Santos, Giancarlo Guizz...
CAISE
2007
Springer
14 years 1 months ago
Specification and Verification of Authorization Policies for Web Services Composition
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Mohsen Rouached, Claude Godart