Sciweavers

86 search results - page 16 / 18
» Integrating Privacy Policies into Business Processes
Sort
View
HIPEAC
2005
Springer
13 years 11 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICSEA
2007
IEEE
13 years 12 months ago
An Access Control Metamodel for Web Service-Oriented Architecture
— With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web ...
Christian Emig, Frank Brandt, Sebastian Abeck, J&u...
RE
2008
Springer
13 years 5 months ago
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Travis D. Breaux, Annie I. Antón, Kent Bouc...
AC
2008
Springer
13 years 5 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
ER
2004
Springer
169views Database» more  ER 2004»
13 years 11 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu