Sciweavers

177 search results - page 14 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
140
Voted
ACISP
1997
Springer
15 years 6 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
119
Voted
DLOG
2003
15 years 3 months ago
Status Report on Description Logics related Project in Korea
In this short position paper, the project of building intelligent business information infrastructure using semantic web, ontology, description logics, and other related knowledge...
Shinyoung Lim
258
Voted
SACMAT
2011
ACM
14 years 4 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
145
Voted
JWSR
2008
145views more  JWSR 2008»
15 years 1 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
EGOV
2003
Springer
15 years 7 months ago
South African e-Government Policy and Practices: A Framework to Close the Gap
E-government in South Africa has a particularly important historical and social context due to the legacy of apartheid. As a result, a ten year egovernment implementation horizon h...
Jonathan Trusler