-
3
-
-
1542700278
-
-
J. Miller et al. (ed.), OMG
-
J. Miller et al. (ed.), "MDA Guide Version 1.0.1". OMG, 2003.
-
(2003)
MDA Guide Version 1.0.1
-
-
-
4
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
J.-M. Jézéquel et al. (eds.), Springer
-
T. Lodderstedt et al., "SecureUML: A UML-Based Modeling Language for Model-Driven Security". In: J.-M. Jézéquel et al. (eds.), Proc. of the 5th Int. Conf. on the Unified Modeling Language, Springer, 2002.
-
(2002)
Proc. of the 5th Int. Conf. on the Unified Modeling Language
-
-
Lodderstedt, T.1
-
11
-
-
33646201275
-
XML-signature syntax and processing
-
Eastlake, D. (ed.), et al.
-
Eastlake, D. (ed.), et al., "XML-Signature Syntax and Processing". W3C Recommendation 12 February 2002.
-
W3C Recommendation 12 February 2002
-
-
-
12
-
-
33646183224
-
XML encryption syntax and processing
-
Eastlake, D. (ed.), et al.
-
Eastlake, D. (ed.), et al., "XML Encryption Syntax and Processing". W3C Recommendation 10 December 2002".
-
W3C Recommendation 10 December 2002
-
-
-
13
-
-
26444602143
-
XACML profile for web-services
-
T. Moses (ed.), et al, September 29
-
T. Moses (ed.), et al, "XACML Profile for Web-Services". XACML TC Working draft, Version 04, September 29, 2003.
-
(2003)
XACML TC Working Draft, Version 04
-
-
-
14
-
-
33749070379
-
Conformance requirements for the OASIS Security Assertion Markup Language (SAML) V2.0
-
P. Mishra (ed.), et al., 24 September
-
P. Mishra (ed.), et al., "Conformance Requirements for the OASIS Security Assertion Markup Language (SAML) V2.0". Committee Draft 02, 24 September 2004.
-
(2004)
Committee Draft 02
-
-
-
16
-
-
33750937976
-
Model driven security for inter-organizational workflows in E-government
-
TED, ISBN 3-540-25016-6
-
R. Breu, M. Hafner, B. Weber, A. Novak, "Model Driven Security for Inter-Organizational Workflows in E-Government". In: Proc. TCGOV 2005, TED, ISBN 3-540-25016-6.
-
Proc. TCGOV 2005
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
Novak, A.4
-
17
-
-
78649297164
-
Modeling and realizing security-critical inter-organizational workflows
-
W. Dosch, N. Debnath (Eds.), ISCA, ISBN 1-880843-52-X
-
R. Breu, M. Hafner, B. Weber, "Modeling and Realizing Security-Critical Inter-Organizational Workflows", In: W. Dosch, N. Debnath (Eds.), Proc. IASSE 2004, ISCA, ISBN 1-880843-52-X.
-
Proc. IASSE 2004
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
-
18
-
-
38349165472
-
A security architecture for inter-organizational workflows: Putting security standards for web services together
-
C. S. Chen et al. (Eds.), INSTICC, ISBN 972-8865-19-8
-
M. Hafner, R. Breu, M. Breu, "A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together". In: C. S. Chen et al. (Eds.): Proc. ICEIS 2005, INSTICC, ISBN 972-8865-19-8, 2005.
-
(2005)
Proc. ICEIS 2005
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
-
19
-
-
33749063417
-
Modeling inter-organizational workflow security in a peer-to-peer environment
-
Accepted for
-
M. Hafher, R. Breu, M. Breu, A. Nowak, "Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment". Accepted for ICWS 2005.
-
ICWS 2005
-
-
Hafher, M.1
Breu, R.2
Breu, M.3
Nowak, A.4
-
20
-
-
0036149234
-
Correctness by construction developing a commercial secure system
-
2002
-
A. Hall, R. Chapman, "Correctness by construction developing a commercial secure system". IEEE Software 19 (2002) 1, 2002, pp. 18-25.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
21
-
-
84935093956
-
Towards a systematic development of secure systems
-
(2004), Auerbach, New York
-
R. Breu, K. Burger, M. Hafner, G. Popp, "Towards a Systematic Development of Secure Systems". Inf. Systems Security 13 (2004) 3, Auerbach, New York, 2004, pp. 5-13.
-
(2004)
Inf. Systems Security
, vol.13
, Issue.3
, pp. 5-13
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Popp, G.4
-
24
-
-
84931827065
-
The P2P approach to Interorganizational Workflows
-
K.R. Dittrich et al. (eds.), Springer, Berlin
-
W.M.P. van der Aalst, M. Weske, "The P2P approach to Interorganizational Workflows". In K.R. Dittrich et al. (eds.): Proc. of the 13th Int. Conf. on Adv. Information Systems Eng. (CAiSE'01), Springer, Berlin, 2001, pp. 140-156.
-
(2001)
Proc. of the 13th Int. Conf. on Adv. Information Systems Eng. (CAiSE'01)
, pp. 140-156
-
-
Van Der Aalst, W.M.P.1
Weske, M.2
-
25
-
-
0002422416
-
Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries
-
W.M.P. van der Aalst, "Loosely Coupled Interorganizational Workflows: Modeling and Analyzing Workflows Crossing Organizational Boundaries". Information and Management 37 (2000) 2, pp. 67-75.
-
(2000)
Information and Management
, vol.37
, Issue.2
, pp. 67-75
-
-
Van Der Aalst, W.M.P.1
-
26
-
-
0034274774
-
Exception handling in workflow systems
-
Z. Luo, et al., "Exception Handling in Workflow Systems". Applied Intelligence 13 (2000) 2, pp. 125-147.
-
(2000)
Applied Intelligence
, vol.13
, Issue.2
, pp. 125-147
-
-
Luo, Z.1
-
27
-
-
0034264831
-
CrossFlow: Cross-organizational workflow management in dynamic virtual enterprises
-
P. Grefen, et al., "CrossFlow: cross-organizational workflow management in dynamic virtual enterprises". International Journal of Computer Systems Science & Engineering 15 (2000) 5, pp. 277-290.
-
(2000)
International Journal of Computer Systems Science & Engineering
, vol.15
, Issue.5
, pp. 277-290
-
-
Grefen, P.1
-
28
-
-
0036099176
-
Event-based interaction management for composite e-services in eFlow
-
F. Casati and M. Shan, "Event-based Interaction Management for Composite E-Services in eFlow". Information Systems Frontiers 4 (2002) 1, pp. 19-31.
-
(2002)
Information Systems Frontiers
, vol.4
, Issue.1
, pp. 19-31
-
-
Casati, F.1
Shan, M.2
-
30
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
E. Gudes, et al., "Modelling, Specifying and Implementing Workflow Security in Cyberspace". Journal of Computer Security 7 (1999) 4, pp. 287-315.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
-
32
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
J. Wainer, et al, "W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints". International Journal of Cooperative Information Systems. 12 (2003) 4, pp. 455-485.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
-
33
-
-
0002422416
-
Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries
-
W.M.P. Van der Aalst, "Loosely Coupled Interorganizational Workflows: Modeling and Analyzing Workflows Crossing Organizational Boundaries". Information and Management 37 (2000) 2, pp. 67-75.
-
(2000)
Information and Management
, vol.37
, Issue.2
, pp. 67-75
-
-
Van Der Aalst, W.M.P.1
-
37
-
-
33646190674
-
-
Art. 1 of the Act published
-
Austrian Signature Act (Signaturgesetz - SigG), Art. 1 of the Act published in the Austrian Federal Law Gazette, part I, Nr. 190/1999.
-
Austrian Federal Law Gazette, Part I
, vol.190
, Issue.1999
-
-
-
38
-
-
84874234276
-
Web service engineering - Advancing a new software engineering discipline
-
Accepted for
-
R. Breu, M. Breu, M. Hafner, A. Nowak, "Web Service Engineering - Advancing A New Software Engineering Discipline". Accepted for ICWE 2005.
-
ICWE 2005
-
-
Breu, R.1
Breu, M.2
Hafner, M.3
Nowak, A.4
-
42
-
-
33646187282
-
A critical overview of the Web Services Choreography Description Language (WS-CDL)
-
March 1
-
A. Barros et al., "A Critical Overview of the Web Services Choreography Description Language (WS-CDL)". BPTrends Newsletter, Volume 3, Number 3, March 1, 2005.
-
(2005)
BPTrends Newsletter
, vol.3
, Issue.3
-
-
Barros, A.1
-
44
-
-
33646178706
-
Modeling permissions in a (U/X)ML world
-
Submitted to, Nuremberg, Germany
-
M. Alam, R. Breu, M. Hafner, "Modeling permissions in a (U/X)ML world". Submitted to ECMDA 2005, Nuremberg, Germany.
-
ECMDA 2005
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
|