Sciweavers

IEEEARES
2006
IEEE
13 years 10 months ago
Secure and Reliable Java-Based Middleware - Challenges and Solutions
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
Walter Binder
IEEEARES
2006
IEEE
13 years 10 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
IEEEARES
2006
IEEE
13 years 10 months ago
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems
Distributed object systems for partitionable systems present a challenge, in that there is a trade-off between availability and consistency. Changes in one partition are not visib...
Stefan Beyer, Alexander Sanchez, Francesc D. Mu&nt...
IEEEARES
2006
IEEE
13 years 10 months ago
Modeling Dependable Systems using Hybrid Bayesian Networks
A hybrid Bayesian Network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are...
Martin Neil, Manesh Tailor, Norman E. Fenton, Davi...
IEEEARES
2006
IEEE
13 years 10 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
IEEEARES
2006
IEEE
13 years 10 months ago
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...
Omar Batarfi, Lindsay Marshall
IEEEARES
2006
IEEE
13 years 10 months ago
Model Driven Security
David A. Basin
IEEEARES
2006
IEEE
13 years 10 months ago
Making Web Services Dependable
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
IEEEARES
2006
IEEE
13 years 10 months ago
An Architecture for Service Discovery Based on Capability Matching
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic serviceoriented systems, such as Grids. Simple service indices do not ad...
Jaka Mocnik, Piotr Karwaczynski
IEEEARES
2006
IEEE
13 years 10 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner