Sciweavers

281 search results - page 22 / 57
» Personalization as a service: the architecture and a case st...
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 9 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
ATVA
2009
Springer
99views Hardware» more  ATVA 2009»
13 years 11 months ago
CLAN: A Tool for Contract Analysis and Conflict Discovery
Abstract. As Service-Oriented Architectures are more widely adopted, it becomes more important to adopt measures for ensuring that the services satisfy functional and non-functiona...
Stephen Fenech, Gordon J. Pace, Gerardo Schneider
XMLSEC
2003
ACM
14 years 29 days ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
SAC
2010
ACM
14 years 1 months ago
Software adaptation patterns for service-oriented architectures
This paper describes the concept of software adaptation patterns and how they can be used in software adaptation of serviceoriented architectures. The patterns are described in te...
Hassan Gomaa, Koji Hashimoto, Minseong Kim, Sam Ma...
EDOC
2009
IEEE
13 years 11 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...