Sciweavers

178 search results - page 30 / 36
» Requirements for Implementing Business Process Models throug...
Sort
View
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 10 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
ICAC
2005
IEEE
14 years 2 months ago
Message from the General Chairs and Program Chairs
Track 2 - Modeling and Abstraction of Services Process Session Chair: Dynamic Service Invocation Control in Service Composition Environments (SCC2010-2004) ...........................
APWEB
2010
Springer
14 years 1 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
IEEEARES
2006
IEEE
14 years 2 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
GRID
2003
Springer
14 years 1 months ago
Autonomic Service Adaptation in ICENI using Ontological Annotation
With the advent of web services standards and a serviceoriented Grid architecture, it is foreseeable that competing as well as complimenting computational services will proliferat...
Jeffrey Hau, William Lee, Steven Newhouse