Sciweavers

36 search results - page 8 / 8
» Guiding the Service Composition Process with Temporal Busine...
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...