Over recent years, "Internet-able" applications have been used to support domains where distributed functionality is essential. This flexibility is also pertinent in situ...
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
This paper focuses on the provision of a nonrepudiation service for CORBA. The current OMG specification of a CORBA non-repudiation service forces the programmer to augment the ap...
Michael Wichert, David B. Ingham, Steve J. Caughey
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...