Sciweavers

2442 search results - page 24 / 489
» Secure Service Orchestration
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
IEEESCC
2009
IEEE
13 years 5 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
ACSAC
1999
IEEE
14 years 10 days ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
DEXAW
2008
IEEE
161views Database» more  DEXAW 2008»
14 years 2 months ago
Model-Based QoS-Enabled Self-Healing Web Services
Failures during web service execution may depend on a wide variety of causes, such as network faults, server crashes, or application-related errors, such as unavailability of a re...
Olga Nabuco, Riadh Ben Halima, Khalil Drira, Maria...
WETICE
2003
IEEE
14 years 1 months ago
A Provision-centric Model for Electronic Services
In addition to producing a pervasive standard and a technology framework, the Web Service initiative has prompted businesses to re-examine their service delivery channels. Back-en...
Clare Gryce, Giacomo Piccinelli, Christian Zirpins