Sciweavers

8 search results - page 1 / 2
» Generating WS-SecurityPolicy Documents via Security Model Tr...
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
13 years 5 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
BPM
2005
Springer
173views Business» more  BPM 2005»
13 years 10 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar
ESORICS
2007
Springer
13 years 10 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
WWW
2001
ACM
14 years 5 months ago
XML and XSLT Modeling for Multimedia Bitstream Manipulation
New devices gaining access to the Internet need to obtain multimedia content adapted to their limited capacities. Scalable formats allow to retrieve different versions of a single...
Sylvain Devillers
NAACL
2004
13 years 5 months ago
Robust Reading: Identification and Tracing of Ambiguous Names
A given entity, representing a person, a location or an organization, may be mentioned in text in multiple, ambiguous ways. Understanding natural language requires identifying whe...
Xin Li, Paul Morie, Dan Roth