Sciweavers

240 search results - page 26 / 48
» Privacy and Utility in Business Processes
Sort
View
ETRICS
2006
14 years 2 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
COMPSAC
2009
IEEE
14 years 3 months ago
Middleware for RFID Systems: An Overview
RFID-Based Systems have started to play a significant role in the automation of many business processes such as ERP systems and object tracking. Several efforts were made within t...
Jameela Al-Jaroodi, Junaid Aziz, Nader Mohamed
ISPASS
2005
IEEE
14 years 4 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...
IEEEARES
2010
IEEE
13 years 9 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
SRDS
2010
IEEE
13 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...