Sciweavers

915 search results - page 133 / 183
» Security in Business Process Engineering
Sort
View
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 2 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
EUROPAR
2004
Springer
14 years 2 months ago
Databases, Workflows and the Grid in a Service Oriented Environment
As the Grid moves towards adopting a service-oriented architecture built on Web services, coupling between processes will rely on secure, reliable, and transacted messages and be s...
Zhuoan Jiao, Jasmin L. Wason, Wenbin Song, Fenglia...
WWW
2005
ACM
14 years 9 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
CONCURRENCY
2006
143views more  CONCURRENCY 2006»
13 years 9 months ago
A Grid workflow infrastructure
In this paper we propose a Grid Workflow Infrastructure, which serves as the base for specifying and executing collaborative interactive workflows within computational grids. The ...
Dieter Cybok
ASWEC
2007
IEEE
14 years 3 months ago
A Formal Model of Service-Oriented Design Structure
—Service-Oriented Computing (SOC) is an emerging paradigm for developing software systems that employ services. Presently there is already much research effort in the areas of se...
Mikhail Perepletchikov, Caspar Ryan, Keith Frampto...