Sciweavers

177 search results - page 18 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
102
Voted
COMPSAC
2003
IEEE
15 years 7 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
CACM
2004
87views more  CACM 2004»
15 years 1 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
CAISE
2007
Springer
15 years 8 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
ICSOC
2007
Springer
15 years 8 months ago
Contextualized B2B Registries
Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and ...
Uwe Radetzki, Mike J. Boniface, Mike Surridge
ESEM
2009
ACM
15 years 8 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...