Sciweavers

177 search results - page 5 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
ICIW
2008
IEEE
14 years 3 months ago
Leveraging Integrated Tools for Model-Based Analysis of Service Compositions
—Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. ...
Howard Foster, Philip Mayer
SOSE
2008
IEEE
14 years 2 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
IFIP
2009
Springer
13 years 6 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
EDOC
2007
IEEE
14 years 2 months ago
Business Process Integration by Using General Rule Markup Language
A business process usually includes multiple business partners that use systems with their business logics represented in different rule (or policy) languages. The integration of ...
Milan Milanovic, Nima Kaviani, Dragan Gasevic, Adr...
ER
2006
Springer
105views Database» more  ER 2006»
14 years 6 days ago
UN/CEFACT'S Modeling Methodology (UMM): A UML Profile for B2B e-Commerce
Abstract. The United Nation's Centre for Trade Facilitation and Electronic Business (UN/CEFACT) is an e-business standardization body. It is known from its work on UN/EDIFACT ...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...