Sciweavers

819 search results - page 156 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
80
Voted
CCS
2001
ACM
15 years 2 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
CAMP
2005
IEEE
15 years 3 months ago
Virtual Astronomy, Information Technology, and the New Scientific Methodology
—All sciences, including astronomy, are now entering the era of information abundance. The exponentially increasing volume and complexity of modern data sets promises to transfor...
S. George Djorgovski
GROUP
2007
ACM
15 years 1 months ago
The story of a working workflow management system
This work presents experiences with the adopting of a workflow management system in a large financial institution. We describe the gradual evolution of a traditional work process,...
Steen Brahe, Kjeld Schmidt
86
Voted
GI
2005
Springer
15 years 3 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...
ICSM
2003
IEEE
15 years 2 months ago
Library Miniaturization Using Static and Dynamic Information
Moving to smaller libraries can be considered as a relevant task when porting software systems to limited-resource devices (e.g., hand-helds). Library miniaturization will be part...
Giuliano Antoniol, Massimiliano Di Penta