Sciweavers

915 search results - page 64 / 183
» Security in Business Process Engineering
Sort
View
ICPPW
2009
IEEE
14 years 4 months ago
Load Balancing Concurrent BPEL Processes by Dynamic Selection of Web Service Endpoints
Business workflows implemented as BPEL processes play an important role for many business applications. BPEL is used to orchestrate a series of Web service calls. Which provider ...
Marvin Ferber, Sascha Hunold, Thomas Rauber
ATAL
2005
Springer
14 years 3 months ago
OWL-P: OWL for protocol and processes
We describe OWL-P (OWL for Processes and Protocols), a methodology and software tool for specifying and enacting interaction protocols among autonomous agents. We use the Web Onto...
Ashok U. Mallya, Nirmit Desai, Amit K. Chopra, Mun...
CCS
2010
ACM
13 years 5 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
SACMAT
2003
ACM
14 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
CERA
2005
101views more  CERA 2005»
13 years 10 months ago
An Integrated Approach to Manufacturing Process Design and Costing
In order to accurately cost the new product manufacture, and to assess a `what if' scenario in a rapid manner, requires an information system which can integrate the process ...
S. Grewal, C. K. Choi