Abstract. Web Services and Web Service composition languages for Web Service choreography are becoming more and more important in the area for inter-enterprise application and proc...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
An integrated management of business processes demands a strictly process-oriented development of the supporting IT. Process-orientation is especially promoted by Service-Oriented...
The need for querying software artifacts is a new emerging design issue in modern software development. Novel techniques such as Model-Driven Architecture or Aspect-Oriented Softwa...