-
1
-
-
0002422416
-
Loosely coupled inter-organizational workflows
-
W.M.P. van der Aalst.: Loosely Coupled Inter-organizational Workflows. In: Information and Management 37 (2000) 2, pp. 67-75.
-
(2000)
Information and Management
, vol.37
, Issue.2
, pp. 67-75
-
-
Van Der Aalst, W.M.P.1
-
3
-
-
1542318699
-
-
IBM and Microsoft A joint security whitepaper from IBM Corporation and Microsoft Corporation. April 2002, Version 1.0
-
IBM and Microsoft. 2002: Security in a Web Services World. A joint security whitepaper from IBM Corporation and Microsoft Corporation. April 2002, Version 1.0.
-
(2002)
Security in a Web Services World
-
-
-
4
-
-
77954120629
-
-
Austrian Signature Act (Signaturgesetz - SigG), Art. 1 of the Act published in the Austrian Federal Law Gazette, part I, Nr. 190/1999
-
Austrian Signature Act (Signaturgesetz - SigG), Art. 1 of the Act published in the Austrian Federal Law Gazette, part I, Nr. 190/1999.
-
-
-
-
5
-
-
33750375147
-
-
To Appear in: A. Mitrakas et al. (Eds.): Secure E-Government Web Services. Idea Group, Inc
-
M. Hafner et al.: Model Driven Security for Inter-Org. Workflows in E-Gov. To Appear in: A. Mitrakas et al. (Eds.): Secure E-Government Web Services. Idea Group, Inc, 2006.
-
(2006)
Model Driven Security for Inter-Org. Workflows in E-Gov
-
-
Hafner, M.1
-
6
-
-
26444432193
-
Web Service Engineering - Advancing a New Software Engineering Discipline
-
D. Lowe, M. Gaedke (Eds.): Web Engineering, ICWE 2005, Sydney, Australia, July ISBN 3-540-27996-2
-
R. Breu et al.: Web Service Engineering - Advancing a New Software Engineering Discipline. In: D. Lowe, M. Gaedke (Eds.): Web Engineering, ICWE 2005, Sydney, Australia, July 2005, Proc. LNCS 3579 Springer 2005, ISBN 3-540-27996-2.
-
(2005)
Proc. LNCS 3579 Springer 2005
-
-
Breu, R.1
-
7
-
-
33749063417
-
Modeling inter-org. Workflow security in a peer-to-peer environment
-
R. Bilof (Ed.) ICWS Orlando, USA, 2005, IEEE Conference Publishing Services, ISBN 0-7695-2409-5
-
M. Hafner et al.: Modeling Inter-org. Workflow Security in a Peer-to-Peer Environment. In: R. Bilof (Ed.): Proc. of the 2005 IEEE International Conference on Web Services, ICWS 2005, Orlando, USA, 2005, IEEE Conference Publishing Services, ISBN 0-7695-2409-5.
-
(2005)
Proc. of the 2005 IEEE International Conference on Web Services
-
-
Hafner, M.1
-
8
-
-
0038315923
-
-
Version 1.1., BEA, IBM, Microsoft, SAP, Siebel
-
T. Andrews et al.: Business Process Execution Language for Web Services, Version 1.1., BEA, IBM, Microsoft, SAP, Siebel (2003).
-
(2003)
Business Process Execution Language for Web Services
-
-
Andrews, T.1
-
12
-
-
77954116188
-
-
Version 1.2 Part 1: Messaging Framework. W3C Rec. 24/06
-
N. Mitra, N.: SOAP Version 1.2 Part 1: Messaging Framework. W3C Rec. 24/06/2003.
-
(2003)
SOAP
-
-
Mitra, N.1
-
13
-
-
0043026142
-
-
Eastlake, D. et al., (eds.) W3C Rec. 14/02
-
Eastlake, D. et al., (eds.): XML-Signature Syntax and Processing. W3C Rec. 14/02/2002
-
(2002)
XML-Signature Syntax and Processing
-
-
-
14
-
-
1142264879
-
-
Eastlake, D. et al. (eds.) W3C Rec. 10/12
-
Eastlake, D. et al. (eds.): XML Encryption Syntax and Processing. W3C Rec. 10/12/2002.
-
(2002)
XML Encryption Syntax and Processing
-
-
-
15
-
-
74549204592
-
-
T. Moses et al. (eds.) XACML Working draft, v. 4/09
-
T. Moses et al. (eds.): XACML Profile for Web-Services. XACML Working draft, v. 4/09/2003.
-
(2003)
XACML Profile for Web-Services
-
-
-
20
-
-
77954103965
-
-
http://www.eu-trustcom.com/
-
-
-
-
21
-
-
0034264831
-
CrossFlow: Cross-org. Workflow man. in dynamic virtual enterprises
-
P. Grefen et al.: CrossFlow: Cross-org. Workflow Man. in Dynamic Virtual Enterprises. In: Int. Journal of Computer Systems Science & Engineering 15 (2000) 5, pp. 277-290.
-
(2000)
Int. Journal of Computer Systems Science & Engineering
, vol.15
, Issue.5
, pp. 277-290
-
-
Grefen, P.1
-
22
-
-
0036099176
-
Event-based interaction management for composite E-services in eFlow
-
F. Casati and M. Shan: Event-based Interaction Management for Composite E-Services in eFlow. In: Information Systems Frontiers 4 (2002) 1, pp. 19-31.
-
(2002)
Information Systems Frontiers
, vol.4
, Issue.1
, pp. 19-31
-
-
Casati, F.1
Shan, M.2
-
24
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
E. Gudes, M. Olivier, R. van de Riet.: Modelling, Specifying and Implementing Workflow Security in Cyberspace. In: Journal of Computer Security 7 (1999) 4, pp. 287-315.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
Olivier, M.2
Van De Riet, R.3
-
26
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
J. Wainer et al.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. In: International Journal of Cooperative Information Systems. 12 (2003) 4, pp. 455-485.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
-
28
-
-
77954132167
-
-
http://www.oracle.com/technology/products/ias/bpel/index.html
-
-
-
-
29
-
-
33646674942
-
From inter-organizational workflows to process execution: Generating BPEL from WS-CDL
-
R. Meersmann et al. (Eds.): LNCS 3762
-
J. Mendling, M. Hafner: From Inter-Organizational Workflows to Process Execution: Generating BPEL from WS-CDL. In conf. and workshop proc. MIOS 2005. R. Meersmann et al. (Eds.): LNCS 3762, pp. 305-315, 2005.
-
(2005)
Conf. and Workshop Proc. MIOS 2005
, pp. 305-315
-
-
Mendling, J.1
Hafner, M.2
|