The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authorization in workflow systems is usually built on top of role-based access control (RBAC), security policies on workflows are then expressed as constraints on the users performing a set of tasks and the roles assigned to them. Unfortunately, when role administration is distributed and potentially untrusted users contribute to the role assignment process, like in the case of Administrative RBAC...
Enterprise architecture (EA) aims to provide management with appropriate indicators and controls to steer and model service-oriented enterprises. EA offers a suitable operating platform to support an organisation's future goals and the roadmap for moving towards this vision. Despite significant research interest in the domain, common enterprises architecture frameworks lack of access control mechanisms...
In this paper we propose the use of multi-view modeling approaches for managing the integration of conceptual artifacts.We propose the integration of behavioral and contextual approaches driven by aspects and models, in order to standardize and integrate behaviors derived from security requirements and functional specifications. Our goal is to build generic aspectual behaviors derived from security...
With ubiquitous computing technologies, business processes become more mobile and distributed and are executed in varying contexts. Context-aware access control mechanisms are an important prerequisite to protect sensitive data and services in secure ubiquitous computing environments. In an IT-supported workflow, process-related context constraints are a means to consider context information in access...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
The aim of this paper is to reveal some intrinsic disadvantages of the current version of UDDI standard, which create problems in using it as a standard for private, in-house storage of enterprise services. Examples include: access control mechanisms in UDDI, limited rich queries capability, inappropriate mapping of Web service artifacts into UDDI entities, impossibility of managing classification...
Digital Earth (DE) is a virtual presentation of the planet based on geographic coordinate, and is an information system with tremendous amount of multiple resolutions and multiple scales data as shown in multiple dimensions. It can visualize the real earth and represent historical phenomena in digital way by using the large amount of data of the earth, and utilizing the computer techniques, image...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.