Sciweavers

1099 search results - page 167 / 220
» Petri net ontology
Sort
View
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 4 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
WORDS
2005
IEEE
14 years 4 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
FASE
2005
Springer
14 years 4 months ago
Termination Criteria for Model Transformation
Model Transformation has become central to most software engineering activities. It refers to the process of modifying a (usually graphical) model for the purpose of analysis (by i...
Hartmut Ehrig, Karsten Ehrig, Juan de Lara, Gabrie...
WEBI
2005
Springer
14 years 4 months ago
IPR: Automated Interaction Process Reconciliation
Inter-organizational business processes usually require complex and time-consuming interactions between partners than simple interactions supported by WSDL. Automated reconciliati...
Zongxia Du, Jinpeng Huai, Yunhao Liu, Chunming Hu,...
BPM
2004
Springer
110views Business» more  BPM 2004»
14 years 4 months ago
Integration of Multi-attributed Negotiations within Business Processes
For the integration of electronic negotiation systems within information systems, it is essential to model both using the same modelling paradigm to avoid frictions. We develop a g...
Carlo Simon, Michael Rebstock