-
1
-
-
22144449959
-
Delivering a grid enabled Distributed Aircraft Maintenance Environment (DAME)
-
Nottingham, U.K. EPSRC: Swindon, [27 February 2005]
-
Jackson T, Austin J, Fletcher M, Jessop M. Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). Proceedings of the UK e-Science All Hands Meeting 2003, Nottingham, U.K. EPSRC: Swindon, 2003. Available at: http://www.nesc.ac.uk/events/ahm2003/AHMCD/ [27 February 2005].
-
(2003)
Proceedings of the UK E-science All Hands Meeting 2003
-
-
Jackson, T.1
Austin, J.2
Fletcher, M.3
Jessop, M.4
-
2
-
-
4243197458
-
-
IBM/Microsoft, 28 October [27 February 2005]
-
Ferguson DF, Storey T, Lovering B, Shewchuk J. Secure, Reliable, Transacted Web Service: Architecture and Composition, IBM/Microsoft, 28 October 2003. ftp://www6.software.ibm.com/software/developer/library/ws-securtrans.pdf [27 February 2005].
-
(2003)
Secure, Reliable, Transacted Web Service: Architecture and Composition
-
-
Ferguson, D.F.1
Storey, T.2
Lovering, B.3
Shewchuk, J.4
-
3
-
-
0038315923
-
-
BEA Systems, International Business Machines Corporation, Microsoft Corporation, SAP AG, Siebel Systems, 5 May [27 February 2005]
-
Andrews T et al. Business Process Execution Language for Web Services, BEA Systems, International Business Machines Corporation, Microsoft Corporation, SAP AG, Siebel Systems, 5 May 2003. ftp://www6.software.ibm.com/software/developer/library/ws-bpel.pdf [27 February 2005].
-
(2003)
Business Process Execution Language for Web Services
-
-
Andrews, T.1
-
4
-
-
0003474971
-
Standardising on workflow-management - The OMG workflow management facility
-
Schulze W, Bussler C, Meyer-Wegener K. Standardising on workflow-management - the OMG workflow management facility. ACM SIGGROUP Bulletin 1988; 19(1):24-30.
-
(1988)
ACM SIGGROUP Bulletin
, vol.19
, Issue.1
, pp. 24-30
-
-
Schulze, W.1
Bussler, C.2
Meyer-Wegener, K.3
-
8
-
-
33747466065
-
A security interpretation of the workflow reference model
-
Vienna, Austria, 1988. IEEE Computer Society Press: Washington, DC
-
Botha RA, Eloff JHP. A security interpretation of the workflow reference model. Proceedings of the Information Security-from Small Systems to Management of Secure Infrastructures, Vienna, Austria, 1988, vol. 2. IEEE Computer Society Press: Washington, DC, 1998; 43-51.
-
(1998)
Proceedings of the Information Security-from Small Systems to Management of Secure Infrastructures
, vol.2
, pp. 43-51
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
11
-
-
0032664448
-
Modeling and analysis of interactions in virtual enterprises
-
Sydney. Australia. IEEE Computer Society Press: Washington, DC, 12-18
-
Davulcu H, Kifer M, Pokorny LR, Ramakrishnan CR, Ramakrishnan IV, Dawson S. Modeling and analysis of interactions in virtual enterprises. Proceedings of the 9th International Workshop on Research Issues on Data Engineering, Sydney. Australia, 1999. IEEE Computer Society Press: Washington, DC, 12-18.
-
(1999)
Proceedings of the 9th International Workshop on Research Issues on Data Engineering
-
-
Davulcu, H.1
Kifer, M.2
Pokorny, L.R.3
Ramakrishnan, C.R.4
Ramakrishnan, I.V.5
Dawson, S.6
-
12
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
Chantilly, VA. ACM Press: New York
-
Kang MH, Park JS, Froscher JN. Access control mechanisms for inter-organizational workflow. Proceedings of the 6th ACM Workshop on Role Based Access Control, Chantilly, VA, 2001. ACM Press: New York; 66-74.
-
(2001)
Proceedings of the 6th ACM Workshop on Role Based Access Control
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
13
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
Gudes E, Olivier M, Riet RPvd. Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security 1999; 7(4):287-315.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
Olivier, M.2
Riet, R.Pvd.3
-
15
-
-
77952749389
-
SecureFlow: A secure Web-enabled workflow management system
-
Fairfax, VA, 1999. ACM Press: New York
-
Huang W-K, Atluri V. SecureFlow: A secure Web-enabled workflow management system. Proceedings of the 4th ACM Workshop on Role-based Access Control, Fairfax, VA, 1999. ACM Press: New York, 1998; 83-94.
-
(1998)
Proceedings of the 4th ACM Workshop on Role-based Access Control
, pp. 83-94
-
-
Huang, W.-K.1
Atluri, V.2
-
16
-
-
84949526405
-
A prototype secure workflow server
-
Phoenix, AZ, 1999. IEEE Computer Society Press: Washington, DC
-
Long DL, Baker J, Fung F. A prototype secure workflow server. Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix, AZ, 1999. IEEE Computer Society Press: Washington, DC, 1999; 129-133.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 129-133
-
-
Long, D.L.1
Baker, J.2
Fung, F.3
-
18
-
-
24644502219
-
A Z patterns catalogue 1: Specification and refactorings, v0.1
-
University of York
-
Stepney S, Polack F, Toyn I. A Z Patterns Catalogue 1: Specification and refactorings, v0.1. Technical Report YCS-2003-349, University of York, 2003.
-
(2003)
Technical Report
, vol.YCS-2003-349
-
-
Stepney, S.1
Polack, F.2
Toyn, I.3
-
21
-
-
58449102888
-
-
Addison-Wesley: Reading, MA
-
Gamma E, Helm R, Johnson R, Vissides J. Design Patterns: Micro-architectures for Reusable Object-oriented Software (APC). Addison-Wesley: Reading, MA, 1994.
-
(1994)
Design Patterns: Micro-architectures for Reusable Object-oriented Software (APC)
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vissides, J.4
-
22
-
-
33747485978
-
-
Blakley B, Heath C (eds.). The Open Group, [27 February 2005]
-
Blakley B, Heath C (eds.). Security Design Patterns. The Open Group, 2004. Available at: http://www.opengroup.org/publications/catalog/g031.htm [27 February 2005]; 102.
-
(2004)
Security Design Patterns
, pp. 102
-
-
-
23
-
-
35248874836
-
RFC client: A pattern for the client-side implementation of a pipelined request/respone protocol
-
Urbana, IL, [27 February 2005]
-
Heuser M, Fernandez EB. RFC Client: A pattern for the client-side implementation of a pipelined request/respone protocol. Proceedings of the Pattern Languages of Programs 1999 (PLoP 99), Urbana, IL, 1999. Available at: http://st-www.cs.uiuc.edu/~plop/plop99/proceedings/ [27 February 2005].
-
(1999)
Proceedings of the Pattern Languages of Programs 1999 (PLoP 99)
-
-
Heuser, M.1
Fernandez, E.B.2
-
24
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, 1987. IEEE Computer Society Press: Washington, DC
-
Clark DD, Wilson DR. A comparison of commercial and military computer security policies. Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, 1987. IEEE Computer Society Press: Washington, DC, 1987; 184-194.
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
25
-
-
0001057387
-
Anonymity controlled electronic payment system
-
Haasrode, Belgium. Technical University of Delft (NL), Information Theory Department
-
Claessens J, Preneel B, Vandewalle J. Anonymity controlled electronic payment system. Proceedings of the 20th Symposium on Information Theory in the Benelux, Haasrode, Belgium. Technical University of Delft (NL), Information Theory Department, 1999; 109-116.
-
(1999)
Proceedings of the 20th Symposium on Information Theory in the Benelux
, pp. 109-116
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
27
-
-
0029774826
-
Inter-enterprise contract architecture for open distributed systems: Security requirements
-
Stanford, CA. IEEE Computer Society: Washington, DC
-
Milosevic Z, Arnold D, O'Connor L. Inter-enterprise contract architecture for open distributed systems: Security requirements. Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'96), Stanford, CA. IEEE Computer Society: Washington, DC, 1996.
-
(1996)
Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'96)
-
-
Milosevic, Z.1
Arnold, D.2
O'Connor, L.3
|