Sciweavers

880 search results - page 106 / 176
» A Meta-Model for Enterprise Applications
Sort
View
96
Voted
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
15 years 6 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
120
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Making Web Services Dependable
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
15 years 6 months ago
Modeling Diverse and Complex Interactions Enabled by Middleware as Connectors in Software Architectures
Middleware enables distributed components to interact with each others in diverse and complex manners. Such interactions should be modeled at architecture level for controlling th...
Yali Zhu
104
Voted
IEEECIT
2005
IEEE
15 years 6 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
110
Voted
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 6 months ago
Design and Implementation of a Service-Oriented Business Rules Broker
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standa...
Florian Rosenberg, Schahram Dustdar