In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
In deļ¬ning large, complex access control policies, one would like to compose sub-policies, perhaps authored by diļ¬erent organizations, into a single global policy. Existing po...
ā Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement ācold potato routingā between autonomous systems. However, the us...
The use of System Dynamics Modeling in Supply Chain Management has only recently re-emerged after a lengthy slack period. Current research on System Dynamics Modelling in supply c...