Sciweavers

372 search results - page 18 / 75
» A Reference Model for Firewall Technology
Sort
View
BPM
2005
Springer
85views Business» more  BPM 2005»
15 years 5 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...
105
Voted
IAJIT
2010
133views more  IAJIT 2010»
14 years 10 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
130
Voted
JHSN
2006
267views more  JHSN 2006»
14 years 11 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
EMISA
2009
Springer
15 years 6 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...
WWW
2006
ACM
16 years 10 days ago
An ontology for internal and external business processes
In this paper we introduce our multi metamodel process ontology (m3po), which is based on various existing reference models and languages from the workflow and choreography domain...
Armin Haller, Eyal Oren, Paavo Kotinurmi