Sciweavers

606 search results - page 9 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
75
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
ICIW
2009
IEEE
14 years 7 months ago
Constraint Integration and Violation Handling for BPEL Processes
Autonomic, i.e. dynamic and fault-tolerant Web service composition is a requirement resulting from recent developments such as on-demand services. In the context of planning-based...
MingXue Wang, Kosala Yapa Bandara, Claus Pahl
CORR
2008
Springer
145views Education» more  CORR 2008»
14 years 9 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
EDOC
2011
IEEE
13 years 9 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...
IEEESCC
2008
IEEE
15 years 4 months ago
A Framework for Service Interoperability Analysis using Enterprise Architecture Models
Good IT decision making is a highly desirable property that can be furthered by the use of enterprise architecture, an approach to IT management using diagrammatic models. In orde...
Johan Ullberg, Robert Lagerström, Pontus John...