In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administratorās time and energy to manually ļ¬lter or remo...
In this paper, we describe a demonstration called an āEnd-to-Endā demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
Transaction Logic is a logic for representing declarative and procedural knowledge in logic programming, databases, and AI. It has been successful in areas as diverse as workflows...