[PDF][PDF] Challenges and opportunities of cloud computing

M Hauck, M Huber, M Klems, S Kounev… - Karlsruhe Reports in …, 2010 - Citeseer
In recent years, Cloud Computing has become an emerging technology that gains wide
influence on IT systems. Cloud Computing is a distributed computing model for enabling …

A Framework to Provide a Bidirectional Abstraction of the Asymmetric Network to Routing Protocols

V Bali, RS Rathore, A Sirohi… - 2009 Second International …, 2009 - ieeexplore.ieee.org
Wireless links are often asymmetric due to heterogeneity in the transmission power of
devices, non-uniform environmental noise, and other signal propagation phenomenon …

Predictability of enforcement

N Bielova, F Massacci - … Symposium on Engineering Secure Software and …, 2011 - Springer
The current theory of runtime enforcement is based on two properties for evaluating an
enforcement mechanism: soundness and transparency. Soundness defines that the output …

Representation-independent data usage control

A Pretschner, E Lovat, M Büchler - International Workshop on Data Privacy …, 2011 - Springer
Usage control is concerned with what happens to data after access has been granted. In the
literature, usage control models have been defined on the grounds of events that, somehow …

Distributed data usage control for web applications: a social network implementation

P Kumari, A Pretschner, J Peschla… - Proceedings of the first …, 2011 - dl.acm.org
Usage control is concerned with how data is used after access to it has been granted.
Respective enforcement mechanisms need to be implemented at different layers of …

A trustworthy usage control enforcement framework

R Neisse, A Pretschner… - 2011 Sixth International …, 2011 - ieeexplore.ieee.org
Usage control policies specify restrictions on the handling of data after access has been
granted. We present the design and implementation of a framework for enforcing usage …

[PDF][PDF] Controlling Compliance of Collaborative Business Processes through an Integration Platform within an E-government Scenario.

L González, R Ruggia - HICSS, 2020 - core.ac.uk
Compliance management is gaining increasing interest in inter-organizational service-
oriented systems, which are usually supported by integration platforms. Due to their …

A theory of constructive and predictable runtime enforcement mechanisms

N Bielova - 2012 - iris.unitn.it
Nowadays owners and users of software systems want their executions to be reliable and
secure. Runtime enforcement is a common mechanism for ensuring that system or program …

Interaction choreography models in BPEL: Choreographies on the enterprise service bus

O Kopp, L Engler, T Van Lessen, F Leymann… - … Conference, S-BPM …, 2011 - Springer
Interactions between services may be globally captured by choreographies. We introduce
BPEL gold supporting modeling interaction choreography models using BPEL. We show the …

Model-based usage control policy derivation

P Kumari, A Pretschner - … Symposium on Engineering Secure Software and …, 2013 - Springer
Usage control is concerned with how data is used after access to it has been granted. In
existing usage control enforcement frameworks, policies are assumed to exist and the …