منابع مشابه
Privacy in Context-aware Mobile Business Applications
Privacy is a big barrier for the acceptance of mobile business applications. Users require full privacy control over their context data like identity, time schedule, profiles, location, etc. Platform for Privacy Preferences (P3P) from W3C proposes a privacy solution for internet users. The aim of this PhD is to extend P3P to support user-centric privacy aspects in both pull and push services re...
متن کاملA New Model For Web Services Timed Business Protocols
Web services technology is emerging as the main pillar of service-oriented architectures (SOAs). This technology facilitates application integration by enabling programmatic access to applications through standard, XML-based languages and protocols. While much progress has been made toward providing basic interoperability among applications, there are still many needs and unexploited opportunit...
متن کاملConceptual Modeling of Privacy-Aware Web Service Protocols
Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stored and used according to the providers’ privacy policies. Since these policies are mainly developed and maintained separately from the business process that collects and manipulates data, it is hard to perform analysis and mana...
متن کاملA Data-Centric Approach for Privacy-Aware Business Process Enablement
In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to al...
متن کاملTimed analysis of security protocols
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Cooperative Information Systems
سال: 2012
ISSN: 0218-8430,1793-6365
DOI: 10.1142/s0218843012500013