Sciweavers

177 search results - page 16 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
ATAL
2005
Springer
15 years 7 months ago
OWL-P: OWL for protocol and processes
We describe OWL-P (OWL for Processes and Protocols), a methodology and software tool for specifying and enacting interaction protocols among autonomous agents. We use the Web Onto...
Ashok U. Mallya, Nirmit Desai, Amit K. Chopra, Mun...
107
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
15 years 6 months ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham
139
Voted
SACMAT
2010
ACM
15 years 6 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
121
Voted
NDSS
2003
IEEE
15 years 7 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis