-
2
-
-
25144470629
-
-
February, Retrieved from
-
Anderson, S. et al. (2005, February). Web Services Trust Language (WS-Trust). Retrieved from ftp://www6.software.ibm.com/software/developer/library/wstrust.pdf
-
(2005)
Web Services Trust Language (WS-Trust)
-
-
Anderson, S.1
-
3
-
-
0346984145
-
-
San Mateo, CA, BPMI. org, 2002. Proposed Final Draft
-
Arkin, A. (2002). Business Process Modeling Language. San Mateo, CA, BPMI. org, 2002. Proposed Final Draft.
-
(2002)
Business Process Modeling Language
-
-
Arkin, A.1
-
4
-
-
33750965969
-
-
Accepted to ARES 2006, Vienne, Austria
-
Alam, M., Breu, R., & Hafner, M. (2006). Modeling permissions in a (U/X)ML world. Accepted to ARES 2006, Vienne, Austria.
-
(2006)
Modeling Permissions In a (U/X)ML World
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
6
-
-
26844510421
-
-
Retrieved from
-
Austrian Security Manual. Retrieved from http://www.cio.gv.at/securenetworks/sihb/
-
Austrian Security Manual
-
-
-
7
-
-
84900623651
-
Art. 1 of the Act
-
Austrian Signature Act (Signaturgesetz - SigG), part I, Nr. 190/1999
-
Austrian Signature Act (Signaturgesetz - SigG). (1999). Art. 1 of the Act. Austrian Federal Law Gazette, part I, Nr. 190/1999.
-
(1999)
Austrian Federal Law Gazette
-
-
-
8
-
-
4544279898
-
-
September, Retrieved from
-
Bajal S. et al. (2004, September). Web Services Policy Framework (WS-Policy). Retrieved from ftp://www6.software.ibm.com/software/developer/library/ws-policy.pdf
-
(2004)
Web Services Policy Framework (WS-Policy)
-
-
Bajal, S.1
-
9
-
-
33646187282
-
A critical overview of the Web Services Choreography Description Language (WS-CDL)
-
Retrieved from
-
Barros, A., Dumas, M., & Oaks, P. (2005). A critical overview of the Web Services Choreography Description Language (WS-CDL). BPTrends News-letter, Vol. 3. Retrieved from http://www.bptrends.com/publicationfiles/03%2D05%20WP%20WS%2DCDL%20Barros%20et%20al.pdf
-
(2005)
BPTrends News-letter
, vol.3
-
-
Barros, A.1
Dumas, M.2
Oaks, P.3
-
11
-
-
84900603228
-
BEA, IBM, Microsoft, SAP AG, Siebel Systems
-
May, Retrieved from
-
BEA, IBM, Microsoft, SAP AG, Siebel Systems. (2003, May). Specification: Business Process Execution Language for Web Services (Version 1.1). Retrieved from http://www.ibm.com/developerworks/library/ws-bpel
-
(2003)
Specification: Business Process Execution Language For Web Services (Version 1.1)
-
-
-
16
-
-
78649297164
-
Modeling and Realizing Security-Critical Inter-Organizational Workflows
-
In W. Dosch & N. Debnath (Eds.), ISCA
-
Breu R., Hafner M., & Weber B. (2004). Modeling and Realizing Security-Critical Inter-Organizational Workflows. In W. Dosch & N. Debnath (Eds.), Proceedings IASSE 2004, ISCA.
-
(2004)
Proceedings IASSE 2004
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
-
17
-
-
84900596148
-
-
July 13, Retrieved from
-
Cantor, S., Kemp, J., & Maler, E. (2004, July 13). Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) (V2.0, Last-Call Working Draft 17). Retrieved from http://www.oasis-open.org/committees/download.php/7737/sstc-saml-core-2.0-draft-17.pdf
-
(2004)
Assertions and Protocols For the OASIS Security Assertion Markup Language (SAML) (V2.0, Last-Call Working Draft 17)
-
-
Cantor, S.1
Kemp, J.2
Maler, E.3
-
18
-
-
0036099176
-
Event-based interaction management for composite e-services in e-flow
-
Casati, F., & Shan, M. (2002). Event-based interaction management for composite e-services in e-flow. Information Systems Frontiers.
-
(2002)
Information Systems Frontiers
-
-
Casati, F.1
Shan, M.2
-
20
-
-
0003791651
-
-
Retrieved from
-
Christensen, E., Curbera, F., Meredith, G., & Weerawarana, S. (2001). Web Services Description Language (WSDL) 1.1. Retrieved from http://www.w3.org/TR/wsdl
-
(2001)
Web Services Description Language (WSDL) 1.1
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
22
-
-
84970947585
-
Software engineering for security: A roadmap
-
In A. Finkelstein (Ed.), ACM Press
-
Devanbu, P., & Stubblebine, S. (2000). Software engineering for security: a roadmap. In A. Finkelstein (Ed.), The future of software engineering (pp. 227-239). ACM Press.
-
(2000)
The Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.1
Stubblebine, S.2
-
23
-
-
11044238224
-
XML Encryption Syntax and Processing
-
(Ed.), December 10, Retrieved from
-
Eastlake D. et al. (Ed.) (2002, December 10). XML Encryption Syntax and Processing. W3C Recommendation. Retrieved from http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
-
(2002)
W3C Recommendation
-
-
Eastlake, D.1
-
24
-
-
84900577817
-
Art. 1 of the Act
-
Federal Act on Provisions Facilitating Electronic Communications with Public Bodies (E-Government Gesetz - E-GovG), March 1, part I, Nr. 10/2004
-
Federal Act on Provisions Facilitating Electronic Communications with Public Bodies (E-Government Gesetz - E-GovG). (2004, March 1). Art. 1 of the Act. Austrian Federal Law Gazette, part I, Nr. 10/2004.
-
(2004)
Austrian Federal Law Gazette
-
-
-
25
-
-
84900667038
-
-
Federal Act concerning the Protection of Personal Data (Datenschutzgesetz - DSG2000), August 17, part I No. 165/1999
-
Federal Act concerning the Protection of Personal Data (Datenschutzgesetz - DSG2000). (1999, August 17). Austrian Federal Law Gazette, part I No. 165/1999.
-
(1999)
Austrian Federal Law Gazette
-
-
-
28
-
-
0034264831
-
CrossFlow: Cross-organizational workflow management in dynamic virtual enterprises
-
Grefen, P., Aberer, K., Hoffner, Y., & Ludwig, H. (2000). CrossFlow: Cross-organizational workflow management in dynamic virtual enterprises. International Journal of Computer Systems Science & Engineering.
-
(2000)
International Journal of Computer Systems Science & Engineering
-
-
Grefen, P.1
Aberer, K.2
Hoffner, Y.3
Ludwig, H.4
-
29
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
Gudes, E., Olivier, M., & van de Riet, R. (1999). Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer.
-
(1999)
Journal of Computer
-
-
Gudes, E.1
Olivier, M.2
van de Riet, R.3
-
31
-
-
38349165472
-
A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together
-
In C. S. Chen, J. Filipe, et al. (Eds.)
-
Hafner M., Breu R., & Breu M. (2005). A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. In C. S. Chen, J. Filipe, et al. (Eds.), Proceedings ICEIS 2005.
-
(2005)
Proceedings ICEIS 2005
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
-
32
-
-
33749063417
-
Modeling inter-organizational workflow security in a peer-to-peer environment
-
In R. Bilof (Ed.), ICWS 2005, Orlando, FL
-
Hafner, M., Breu, R., Breu, M., & Nowak, A. (2005). Modeling inter-organizational workflow security in a peer-to-peer environment. In R. Bilof (Ed.), Proceedings of the 2005 IEEE International Conference on Web Services, ICWS 2005, Orlando, FL.
-
(2005)
Proceedings of the 2005 IEEE International Conference On Web Services
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
Nowak, A.4
-
33
-
-
0036149234
-
Correctness by construction developing a commercial secure system
-
Hall A., Chapman R. (2002). Correctness by construction developing a commercial secure system. IEEE Software, 19(1) 18-25.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
35
-
-
84900644672
-
-
Retrieved from
-
IBM: BPWS4J. Retrieved from http://www.alphaworks.ibm.com/tech/bpws4j
-
IBM: BPWS4J
-
-
-
38
-
-
61849168397
-
Production workflow: Concepts and techniques
-
Retrieved from
-
Leyman, F., & Roller, D. (2000). Production workflow: Concepts and techniques. Prentice-Hall. Retrieved from http://www.uml.org
-
(2000)
Prentice-Hall
-
-
Leyman, F.1
Roller, D.2
-
41
-
-
0034274774
-
Exception handling in workflow systems
-
Luo, Z., Shet, A., Kochut, K., & Miller, J. (2000). Exception handling in workflow systems. Applied Intelligence.
-
(2000)
Applied Intelligence
-
-
Luo, Z.1
Shet, A.2
Kochut, K.3
Miller, J.4
-
42
-
-
33846208353
-
-
OECD Guidelines for the Security of Information Systems and Networks. URL
-
Mantell, K. (2003). From UML to BPEL. IBM-developerWorks. OECD Guidelines for the Security of Information Systems and Networks. URL: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guide-line.pdf
-
(2003)
From UML to BPEL. IBM-developerWorks
-
-
Mantell, K.1
-
44
-
-
0033319977
-
Process-oriented Architectures for Electronic Commerce and Interorganizational Workflow
-
Van der Aalst, W. M. P. (1999). Process-oriented Architectures for Electronic Commerce and Interorganizational Workflow. Information Systems.
-
(1999)
Information Systems
-
-
Van der Aalst, W.M.P.1
-
45
-
-
0002422416
-
Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries
-
Van der Aalst, W. M. P. (2000). Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries. In formation and Management.
-
(2000)
Formation and Management
-
-
Van der Aalst, W.M.P.1
|