TIMED PRIVACY-AWARE BUSINESS PROTOCOLS

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy in Context-aware Mobile Business Applications

Privacy is a big barrier for the acceptance of mobile business applications. Users require full privacy control over their context data like identity, time schedule, profiles, location, etc. Platform for Privacy Preferences (P3P) from W3C proposes a privacy solution for internet users. The aim of this PhD is to extend P3P to support user-centric privacy aspects in both pull and push services re...

متن کامل

A New Model For Web Services Timed Business Protocols

Web services technology is emerging as the main pillar of service-oriented architectures (SOAs). This technology facilitates application integration by enabling programmatic access to applications through standard, XML-based languages and protocols. While much progress has been made toward providing basic interoperability among applications, there are still many needs and unexploited opportunit...

متن کامل

Conceptual Modeling of Privacy-Aware Web Service Protocols

Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stored and used according to the providers’ privacy policies. Since these policies are mainly developed and maintained separately from the business process that collects and manipulates data, it is hard to perform analysis and mana...

متن کامل

A Data-Centric Approach for Privacy-Aware Business Process Enablement

In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to al...

متن کامل

Timed analysis of security protocols

We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Cooperative Information Systems

سال: 2012

ISSN: 0218-8430,1793-6365

DOI: 10.1142/s0218843012500013