Sciweavers

249 search results - page 39 / 50
» Modelling Security Goals in Business Processes
Sort
View
MAS
1998
Springer
153views Communications» more  MAS 1998»
13 years 12 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
WWW
2005
ACM
14 years 8 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
CAISE
2010
Springer
13 years 7 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 5 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
WSC
2004
13 years 9 months ago
Educating Middle and High School Students in Space Operations: The Simulation Approach
This paper describes a proposed pilot educational program to teach middle and high school students the space shuttle processing operations. This pilot program involves a partnersh...
Mansooreh Mollaghasemi, Michael Georgiopoulos, Ann...