Sciweavers

57 search results - page 7 / 12
» Interactive Credential Negotiation for Stateful Business Pro...
Sort
View
EJIS
2006
79views more  EJIS 2006»
14 years 11 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
SOFSEM
2009
Springer
15 years 8 months ago
A Formal Model of Business Application Integration from Web Services (Position Paper)
Abstract. Currently there are many service providers on the Web. Industry recognizes that from Web services many different business applications can be quickly created. A Web servi...
Kaiyu Wan, Mubarak Mohammad, Vasu S. Alagar
CCS
2006
ACM
15 years 3 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
NOMS
1998
IEEE
160views Communications» more  NOMS 1998»
15 years 3 months ago
SP-to-SP service ordering specification and its implementation
Network Management Forum (NMF) has defined a set of basic business processes dealing with major TMN service management functions such as performance management, fault management, b...
Graham Chen, Qinzheng Kong, Pierre-Yves Benain
CN
2004
136views more  CN 2004»
14 years 11 months ago
Managing service level agreements in Premium IP networks: a business-oriented approach
This paper presents a market-enabling framework where users, content providers and network operators can interact in the seamless, transparent sale and delivery of a wide range of...
Salvatore D'Antonio, Maurizio D'Arienzo, Marcello ...