Enterprise Applications are increasingly moving towards providing web access to their users through "thin clients". There is a strong case for their integration using we...
Vishnu S. Pendyala, Simon S. Y. Shim, Jerry Z. Gao
Abstract. This paper describes how semantic bridges realized in terms of rulebased ontology mappings can be incorporated into BPEL processes. The approach is explained by applying ...
: Swiss Re has established an architectural framework, tools, and concepts that enable business people to specify their view of the business in a consistent and formal manner. Base...
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...