Sciweavers

177 search results - page 7 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
BPM
2011
Springer
295views Business» more  BPM 2011»
13 years 9 months ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann
TKDE
2008
177views more  TKDE 2008»
14 years 9 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
61
Voted
IADIS
2008
14 years 11 months ago
E-Learning In The Field Of E-Business Support
E-business is one important element promoting business competitiveness and is thus closely linked to innovation. However, the potentials of ICT for business processes are not yet ...
Elisabeth Mendoza
POLICY
2007
Springer
15 years 3 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
97
Voted
ECLIPSE
2005
ACM
14 years 11 months ago
Leveraging Eclipse for integrated model-based engineering of web service compositions
In this paper we detail the design and implementation of an Eclipse plug-in for an integrated, model-based approach, to the engineering of web service compositions. The plug-in al...
Howard Foster, Sebastián Uchitel, Jeff Mage...