Sciweavers

1226 search results - page 107 / 246
» Service Oriented Security Architecture
Sort
View
ICIW
2009
IEEE
15 years 4 months ago
A Model-Driven Approach for Monitoring Business Performance in Web Service Compositions
— Supporting business services through Web service compositions (WSC) as part of service-oriented architectures (SOA) involves business performance monitoring requirements. Their...
Christof Momm, Michael Gebhart, Sebastian Abeck
PPPJ
2006
ACM
15 years 4 months ago
Mapping clouds of SOA- and business-related events for an enterprise cockpit in a Java-based environment
This paper is about business process management (BPM) and business activity monitoring (BAM) using event processing. We will show why the management of business processes is impor...
Daniel Jobst, Gerald Preissler
109
Voted
IEEESCC
2006
IEEE
15 years 4 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan
USENIX
2007
15 years 14 days ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
101
Voted
IEEESCC
2008
IEEE
15 years 4 months ago
A Fault Tolerance Approach for Enterprise Applications
Service Oriented Architectures (SOAs) have emerged as a preferred solution to tackle the complexity of large-scale, complex, distributed, and heterogeneous systems. Key to success...
Vina Ermagan, Ingolf Krüger, Massimiliano Men...