메뉴 건너뛰기




Volumn 4, Issue , 2008, Pages 301-312

Towards Secured and Interoperable Business Services

Author keywords

Business Process Reengineering in interoperable scenarios; Enterprise modeling for interoperability; Interoperable enterprise architecture; Security issues in interoperability; Service oriented Architectures for interoperability

Indexed keywords


EID: 49149083108     PISSN: 21992533     EISSN: 21992541     Source Type: Conference Proceeding    
DOI: 10.1007/978-1-84800-221-0_24     Document Type: Conference Paper
Times cited : (4)

References (42)
  • 9
    • 37549061778 scopus 로고    scopus 로고
    • Extended Service Integration: Towards Manufacturing SLA
    • Advances in Production Management Systems, Olhager, J., Persson, F.. Eds
    • Biennier F., Ali L., Legait A., 2007. Extended Service Integration: Towards Manufacturing SLA. IFIP International Federation for Information Processing, Volume 246, Advances in Production Management Systems, Olhager, J., Persson, F.. Eds., pp.87-94
    • (2007) IFIP International Federation for Information Processing , vol.246 , pp. 87-94
    • Biennier, F.1    Ali, L.2    Legait, A.3
  • 10
    • 85187696560 scopus 로고    scopus 로고
    • Towards service oriented enterprise. In the IFIP International Conference on PROgraming LAnguages for MAchine Tools
    • June, Shanghai, China,. (ISBN: 978-0-387-34402-7)
    • Chaari S., Benamar C., Biennier F., Favrel J., 2006. Towards service oriented enterprise. In the IFIP International Conference on PROgraming LAnguages for MAchine Tools, PROLAMAT 2006, 15-17 June, Shanghai, China, pp 920-925. (ISBN: 978-0-387-34402-7)
    • (2006) PROLAMAT 2006 , vol.15-17 , pp. 920-925
    • Chaari, S.1    Benamar, C.2    Biennier, F.3    Favrel, J.4
  • 11
    • 84882588707 scopus 로고    scopus 로고
    • 2008. Enhancing Web Service Selection by QoS-Based Ontology and WS-Policy. accepted in the 23rd ACM Symposium on Applied Computing, Ceará
    • March
    • Chaari S., Badr Y., Biennier F., 2008. Enhancing Web Service Selection by QoS-Based Ontology and WS-Policy. accepted in the 23rd ACM Symposium on Applied Computing, Ceará, Brazil, 16-20 March 2008
    • (2008) Brazil , pp. 16-20
    • Chaari, S.1    Badr, Y.2    Biennier, F.3
  • 13
    • 85187660633 scopus 로고    scopus 로고
    • Privacy with P3P, 239 pages, O’Reilly
    • Cranor Lorrie, Privacy with P3P, 239 pages, O’Reilly, 2001
    • (2001) Cranor Lorrie
  • 15
    • 85187643326 scopus 로고    scopus 로고
    • Enquête sur les politiques de sécurité de l'information et la sinistralité informatique en France en 2005
    • CLUSIF, 2005. Enquête sur les politiques de sécurité de l'information et la sinistralité informatique en France en 2005. online [Last Visited September 30, 2007]: http://www.clusif.asso.fr/fr/production/sinistralite/docs/etude2005.pdf
    • (2005) online [Last Visited September 30
  • 18
    • 0031251017 scopus 로고    scopus 로고
    • Agile Manufacturing Research: Accomplishments and Opportunities
    • DeVor R., Graves R., Mills J.J., 1997. Agile Manufacturing Research: Accomplishments and Opportunities. IIE Transactions n° 29, pp. 813-823
    • (1997) IIE Transactions n° , vol.29 , pp. 813-823
    • Devor, R.1    Graves, R.2    Mills, J.J.3
  • 19
    • 85187676946 scopus 로고
    • Trusted Computer Security Evaluation Criteria-Orange Book. DOD 5200
    • Department Of Defence (DoD), 1985. Trusted Computer Security Evaluation Criteria-Orange Book. DOD 5200.28-STD report.
    • (1985) Department of Defence (Dod) , pp. 28-STD
  • 23
    • 85187716529 scopus 로고    scopus 로고
    • Fair Use, DRM and Trusted Computing. Communications of the ACM, vol 46, n°4,, pp.34-39
    • Erickson J.S., 2003. Fair Use, DRM and Trusted Computing. Communications of the ACM, vol 46, n°4,, pp.34-39
    • (2003)
    • Erickson, J.S.1
  • 25
    • 85187652828 scopus 로고    scopus 로고
    • IBM and Microsoft Corp., 2002. Security in a Web Services World: A Proposed Architecture and Roadmap. 28pp white paper, Available Online at ftp://www6.software.ibm.com/software/developer/library/ws-secmap.pdf, [Last Visited, September 30, 2007]
    • A Proposed Architecture and Roadmap. 28Pp White Paper
  • 29
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for Secure Systems Development. Lecture Notes in Computer Science 2460
    • Jürjens J., 2002, UMLsec: Extending UML for Secure Systems Development. Lecture Notes in Computer Science 2460, UML 2002 Proceedings, pp. 412-425
    • (2002) UML 2002 Proceedings , pp. 412-425
    • Jürjens, J.1
  • 31
    • 85187685056 scopus 로고    scopus 로고
    • Properties, Implications and Prescriptions. Sloan management review, fall
    • Levitin A.V., Redman T.C., 1998. Data as a Resource: Properties, Implications and Prescriptions. Sloan management review, fall 1998. pp. 89-101
    • (1998) 1998. Data as a Resource , pp. 89-101
    • Levitin, A.V.1    Redman, T.C.2
  • 32
    • 0034318674 scopus 로고    scopus 로고
    • The Application of Security Policy to Role-based Access Control and the Common Data Security Architecture
    • Lin A., Brown R., 2000, The Application of Security Policy to Role-based Access Control and the Common Data Security Architecture, Communication (23) pp. 1584-1593
    • (2000) Communication , vol.23 , pp. 1584-1593
    • Lin, A.1    Brown, R.2
  • 41
    • 85187648737 scopus 로고    scopus 로고
    • MINI CMMI(SM), SE/SW/IPPD/SS Ver 1.1, Staged Representation
    • Williams R., Wegerson P., 2002. MINI CMMI(SM), SE/SW/IPPD/SS Ver 1.1, Staged Representation. Cooliemon.
    • (2002) Cooliemon
    • Williams, R.1    Wegerson, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.