Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model
|
|
|
- Juniper Hutchinson
- 10 years ago
- Views:
Transcription
1 , pp Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model Shu-Ping Lu 1, Kuei-Kai Shao 1, Yu-Nung Chao 1, Kuo-Shu Luo 1, Chi-Hua Chen 1,2 1 Service Systems Technology Center, Industrial Technology Research Institute, Hsinchu, Taiwan, R.O.C. 2 Institute of Information Management, National Chiao Tung University, Taiwan, R.O.C. [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. The effective business process management has received attention recently for improving business process performance and supporting coordination scenarios in collaboration platform. However, the user and role authorities in the existed collaboration platform cannot automatically change in accordance with time and location. Since handling processes with tasks and data separated by enterprise boundaries is hard, this study presents the Collaboration Service Integration Platform (CSIP) on the basis of the standard Business Process Model and Notation (BPMN) and Context-Aware RBAC (CA-RBAC) model. CSIP is not only to narrow the gap in the existed popular collaboration platform such as workflow process limitations but also to satisfy the increasing needs on the different contextual attributes. Keywords: Access Control Model; Business Process Model and Notification; Role-Based Access Control 1 Introduction With the globalization of markets, firms have struggled to achieve greater collaboration to leverage the knowledge and resources [1]. The effective management of an organization s business processes, as a result, became ever more important [2]. Fundamentally, business processes either private or public business processes commonly found in business organizations or inter-organizational collaboration. Well business management for a series of tasks for different workflows of jobs or processes within an organization can make production and services more efficient. Interfirm collaborations with efficient business management instruments can improve the competitiveness of companies. Handle processes with tasks and data separated by enterprise boundaries, however, is hard for process collaboration environments, for reasons such as security, privacy, etc [3]. Google Sites is a popular collaboration platform which provides highly configurable blog, Wiki and content management functions [4]. Users can create and share contents with each other on the web. A collection of group documents interactively is distributed and processed on the site. Google site can streamline workflows and allow everyone to work together. Nevertheless, Google Sites is not ISSN: ASTL Copyright 2013 SERSC
2 ideal because of signoff without watermark, lack of workflow agent listener service, limited use of HyperText Markup Language (HTML) coding and lack of Cascading Style Sheets (CSS) incorporated in the theme templates, etc [4]. To avoid the limitations of business processes in Google Sites, this study develops collaboration service integration platform which is combined with open-source business process management and workflow suites. To guarantee that the protected business services can only be accessed by authorized users as the specified manners in collaborative environment, access control [5] is an important authorization policy and security mechanism for organizations to protect their resources in collaborative environments. Rule-Based Access Control (RBAC) [6] model is practical and widely deployed in distinct enterprises. Furthermore, Context-Aware RBAC (CA-RBAC) [7] can involve the contextual attributes such as location and time. Therefore, this study proposes the Collaboration Service Integration Platform (CSIP) using CA-RBAC to satisfy the increasing demands on the different contextual attributes. The CSIP is based on Business Process Model and Notation (BPMN) 2.0 which is an important standard and supplied by large global software companies. The remainder of this study is structured as follows. In Section 2 this study provides background knowledge through the description of related technologies, such as the concept of access control models. In Section 3 this study designs and implements the architecture of CSIP. Finally, conclusions and future work are given in Section 4. 2 Access Control Models Previous research to specify the different access control policies has presented dozens of access control models since the late 1960s. The research community contains Access Matrix [8], Discretionary Access Control (DAC) [9], Mandatory Access Control (MAC) [9], and RBAC [10]. While DAC and MAC appeared in the early 1970 s it took another quarter century for RBAC to thrive and develop robust foundations. RBAC emerged as a result of increasing practitioner dissatisfaction with the then dominant DAC and MAC paradigms, encouraging academic research on RBAC. With the flourish of the distributed systems, RBAC models are more flexible and practical [11]. RBAC is an approach used for advanced access control to restrict system access to authorized users, and is widely deployed in distinct enterprises of all sizes to support information access management. In recent years, some extensions to the authorization as well as the administrative models for RBAC have been adopted [12]. Nevertheless, RBAC is often required to think of various context information in authorization decisions, especially in highly interactive and interconnected environments. Furthermore carry out fine grained policies where permissions are directly assigned to certain individuals in many real-world applications is necessary [13]. Devdatta Kulkarni et al. [7] proposed a CA-RBAC model for pervasive computing applications. Context identification mechanisms can be designed to Copyright 2013 SERSC 127
3 suggest proper contexts to users. The contextual attributes may involve the translation of location, time, proximity, or the executing subject. Due to the increasing demands on the different contextual attributes, this paper adopts CA-RBAC to meet and satisfy the industry needs. 3 The Design and Implementation of CSIP The CSIP includes (1) users, (2) Human-Computer Interface Server (HCIS), (3) Web Service Server (WSS), (4) Content Management Server (CMS), (5) Workflow Server (WFS), (6) Database Server (DBS), (7) Authentication Server (AS), and (8) tools as shown in Figure 1. Fig. 1. The architecture of CSIP. 3.1 Users Users can utilize various terminal devices that include Personal Computer (PC), notebook, Tablet PC, Personal Digital Assistant (PDA), and smart phone to communicate with CSIP to access the information, tasks, files, etc. This study uses HyperText Markup Language (HTML) and JavaScript to design and implement the client site, so users can utilize various terminal devices to access CSIP. 128 Copyright 2013 SERSC
4 3.2 Human-Computer Interface Server Users can access CSIP via HCIS which is implemented by using Play framework with Model-View-Controller (MVC) model. HCIS uses Hibernate technique to build the Object Relational Mapping (ORM) and uses Groovy language to generate the view template. HCIS provides account management, authority management, record management, and message management which are presented as follows. 3.3 Web Service Server This study uses Tomcat 6.0 framework to implement the WSS and builds the web Application Programming Interfaces (APIs) based on Representational State Transfer (REST) format. The WSS includes middleware service, watermark service, and automatic file management service which are presented in following subsections. 3.4 Content Management Server The CMS is a content and resource storage center and combines with File Transfer Protocol (FTP), Web Distributed Authoring and Versioning (WebDAV), Network File System (NFS), and Content Management Interoperability Services (CMIS) for resource access. This study uses Alfresco framework which is an open-source system based MVC model to implement the CMS. 3.5 Workflow Server The business processes can be built in the WFS which is implemented by using Bonita framework This study uses BPMN 2.0 to build the workflows of business process, and the workflows include pools, lanes, tasks, roles, gateways, connector, and messages. The tasks, roles, messages of task, user actions are predefined in each workflow. WFS offers task management and role management which are presented as follows. 3.6 Database Server For implementation, this study uses MySQL Server 5.5 technique to implement the DBS which includes HCIS data, CMS data, WFS data, connection module, and control module. The server also offers the web services properties to store and access, and it is a powerful application tool to provide reliable information for collaboration. 3.7 Authentication Server This study designs an AS to integrate the CSIP and the existed servers in company for single sign-on (SSO). AS is implemented with Light-weighted Data Access Protocol Copyright 2013 SERSC 129
5 (LDAP) on Ubuntu to build the user s accounts and information. When HCIS receives the login request from user, it can send the request to AS via SSL to verify the user account. 3.8 Tools The CSIP which is an open platform can provide APIs to interact with external systems and tools. The tools (e.g., document editors, image painters, and online viewers) can be embedded and built in CSIP easily for user operation. 4 Conclusions Business process management is one of the most widely used methods; as a result, effective and efficient management of an organization s business processes in collaboration platform become ever more important. However, the user and role authorities in the existed collaboration platform cannot automatically change in accordance with time and location. Due to the hard diverse process handling with tasks and data separated by enterprise boundaries, this study proposes the CSIP combines the standard BPMN and CA-RBAC model to offer friendly graphical user interface and access control with contextual attributes solution in collaboration environment. The CSIP is a practical approach to satisfy the increasing demands on different workflow and contextual attributes in machine tools industry as well. References 1. Cao, M., Zhang, Q.: Supply Chain Collaboration: Impact on Collaborative Advantage and Firm Performance. Journal of Operations Management, Vol. 29, No.3, pp (2011) 2. Ko, R.K.L., Lee, S.S.G., Lee, E.W.: Business Process Management (BPM) Standards: a Survey. Business Process Management Journal, Emerald Publishing, Vol. 15, No.5, pp (2009) 3. Chen, Q., Hsu, M.: Inter-Enterprise Collaborative Business Process Management. Proceedings of 17th IEEE Int. Conference on Data Engineering (ICDE), pp , Heidelberg, Germany (2001) 4. Google Site, Wikipedia, available: 5. Sandhu, R.S., Samarati, P.: Access Control: Principle and Practice. IEEE Communications Magazine, Vol.32, No. 9, pp (1994) 6. Zhang, X., Oh, S., Sandhu, R.: PBDM: a Flexible Delegation Model in RBAC. Proceedings of the eighth ACM symposium on Access control models and technologies (SACMAT '03), pp , New York, USA (2003) 7. Kulkarni, D., Tripathi, A.: Context-Aware Role-Based Access Control in Pervasive Computing Systems. Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT 08), pp , Estes Park, CO, USA (2008) 8. Lampson, B.W.: Dynamic Protection Structures. Proceedings of American Federation of Information Processing Societies conference, Las Vegas, pp Nevada, USA (1969) 130 Copyright 2013 SERSC
6 9. D.T.C.S.E.C. (TCSEC), DoD STD Foundations, MITRE Technical Report 2547 (1973) 10. Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. The MITRE Corp.,Vol.1-111, Bedford, Mass (1973) 11. Jin, X., Krishnan, R., Sandhu, R.: A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. Proceedings of the International Conference on Data and Applications Security and Privacy, pp , Paris, France (2012) 12. Joo, K.S., Woo, J.W.: Object-Oriented Analysis and Design Methodology for Secure Web Applications Focused on Role Based Access Control. Proceedings of the 1st International Conference on Advanced Information and Computer Technology (AICT 2013), ASTL Vol. 26, pp , Rome, Italy (2013) 13. Neumann, G., Strembeck, M.: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. Proceedings of the eighth ACM Symposium on Access Control Models and Technologies (SACMAT '03), pp , New York, USA (2003) Copyright 2013 SERSC 131
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Review of the Techniques for User Management System
, pp.87-91 http://dx.doi.org/10.14257/astl.2014.46.20 Review of the Techniques for User Management System Jaegeol Yim *, Gyeyoung Lee *, Kyungsoo Ham * *Dongguk University at Gyeongju Korea, {yim, lky,
Kentico CMS 5 Developer Training Syllabus
Kentico CMS 5 Developer Training Syllabus June 2010 Page 2 Contents About this Course... 4 Overview... 4 Audience Profile... 4 At Course Completion... 4 Course Outline... 5 Module 1: Overview of Kentico
PROJECT MANAGEMENT SYSTEM
Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU
Content management system comparison
CMS Content management system comparison Content management system comparison Listed below is an outline of the major features, capabilities and shortcomings of today s most popular content management
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
Modeling Web Applications Using Java And XML Related Technologies
Modeling Web Applications Using Java And XML Related Technologies Sam Chung Computing & Stware Systems Institute Technology University Washington Tacoma Tacoma, WA 98402. USA [email protected] Yun-Sik
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Multi Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
PingFederate. Identity Menu Builder. User Guide. Version 1.0
Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite
Web Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
SOFTWARE ENGINEERING PROGRAM
SOFTWARE ENGINEERING PROGRAM PROGRAM TITLE DEGREE TITLE Master of Science Program in Software Engineering Master of Science (Software Engineering) M.Sc. (Software Engineering) PROGRAM STRUCTURE Total program
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Directory-as-a-Service Primer (DaaS)
Directory-as-a-Service Primer (DaaS) Directory-as-a-Service or DaaS is the modern adaptation of traditional Microsoft Active Directory (AD) and Lightweight Directory Access Protocol (LDAP). It is a cloud-based
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Mobile optimized user experience Simplified access to
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
What is BPM? Software tools enabling BPM
What is BPM? BPM, or Business Process Management, is a technology, but it is also more than that. Broadly speaking, one can consider BPM as a management discipline in which processes are valued as assets
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Web project proposal. European e-skills Association
Web project proposal European e-skills Association LUCISMEDIA WEB DESIGN PROPOSAL CONTENTS Lucismedia... 3 Building enterprise social communities... 3 project objective... 4 Project scope... 6 Interface
An Architecture for Web-based DSS
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 75 An Architecture for Web-based DSS Huabin Chen a), Xiaodong
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
HTML5. Turn this page to see Quick Guide of CTTC
Programming SharePoint 2013 Development Courses ASP.NET SQL TECHNOLGY TRAINING GUIDE Visual Studio PHP Programming Android App Programming HTML5 Jquery Your Training Partner in Cutting Edge Technologies
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
BPM for Quality Assurance Systems in Higher Education. Vicente Cerverón-Lleó, Juan Cabotà-Soro, Francisco Grimaldo-Moreno, Ricardo Ferrís-Castell
BPM for Quality Assurance Systems in Higher Education Vicente Cerverón-Lleó, Juan Cabotà-Soro, Francisco Grimaldo-Moreno, Ricardo Ferrís-Castell Motivation (1) The European Higher Education Area (EHEA)
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Is Liferay Right for Your Organization? Seven Things to Consider When Choosing a Portal Platform
Is Liferay Right for Your Organization? Seven Things to Consider When Choosing a Portal Platform BY DAN LILIEDAHL, CTO, TANDEMSEVEN The outcome of your portal initiative and its success is directly related
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
MatchPoint Benefits with SharePoint 2013
MatchPoint Benefits with SharePoint 2013 MatchPoint Fact Sheet 25.01.2013 Colygon AG Version 2.0 Disclaimer The complete content of this document is subject to the general terms and conditions of Colygon
From RPC to Web Apps: Trends in Client-Server Systems
From RPC to Web Apps: Trends in Client-Server Systems George Coulouris 1 Overview Motivation - to consider the effect of client-server interaction on the development of interactive apps Style of client-server
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
Web Development I & II*
Web Development I & II* Career Cluster Information Technology Course Code 10161 Prerequisite(s) Computer Applications Introduction to Information Technology (recommended) Computer Information Technology
Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications
, pp.71-80 http://dx.doi.org/10.14257/ijsia.2014.8.1.07 Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications Kyung-Soo Joo 1 and Jung-Woong Woo 2 1 Department of Computer
EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings [email protected] October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.
The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
BonitaSoft Corporate and Product Overview. www.bonitasoft.com Copyright BonitaSoft S.A.
BonitaSoft Corporate and Product Overview 2 Agenda Introductions Corporate overview Product overview Q&A created by Bonitasoft Team thanks Jeremy and Ronak Francisco Kem Iti Saito [email protected] 3
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Business Application Development Platform
Business Application Development Platform Author Copyright Last update Version Document type Sclable Business Solutions GmbH Attribution-NonCommercial-NoDerivatives 4.0 International 01/28/2014 1.0 Technical
WEB& WEBSITE DESIGN TRAINING
WEB& WEBSITE DESIGN TRAINING Introduction to Websites Course Content: Introduction to Web Technologies Protocols and Port Numbers Domain Names, DNS and Domaining Client and Server Software. Static, Dynamic
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
Cisco Virtual Network Management Center
Data Sheet Cisco Virtual Network Management Center Introduction The dynamic nature of the cloud paradigm introduces new needs for automation, but it also facilitates new types of automation due to the
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
ORACLE ADF MOBILE DATA SHEET
ORACLE ADF MOBILE DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Java technology enables cross-platform business logic Mobile optimized
Content Management Systems: Drupal Vs Jahia
Content Management Systems: Drupal Vs Jahia Mrudula Talloju Department of Computing and Information Sciences Kansas State University Manhattan, KS 66502. [email protected] Abstract Content Management Systems
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
VISION BPM. Business Process Management. www.visionware.ro
VISION BPM Business Process Management 2 Streamline your business processes with is an integrated business processes modeling, optimization and management solution enabling companies to increase their
IT3503 Web Development Techniques (Optional)
INTRODUCTION Web Development Techniques (Optional) This is one of the three optional courses designed for Semester 3 of the Bachelor of Information Technology Degree program. This course on web development
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
Content Management Systems: Drupal Vs Jahia
Content Management Systems: Drupal Vs Jahia Mrudula Talloju Department of Computing and Information Sciences Kansas State University Manhattan, KS 66502. [email protected] Abstract Content Management Systems
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
G Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
IT Insights. Using Microsoft SharePoint 2013 to build a robust support and training portal. A service of Microsoft IT Showcase
IT Insights A service of Microsoft IT Showcase Using Microsoft SharePoint 2013 to build a robust support and training portal June 2015 The Microsoft IT team that is responsible for hosting customer and
Open Source Content Management System for content development: a comparative study
Open Source Content Management System for content development: a comparative study D. P. Tripathi Assistant Librarian Biju Patnaik Central Library NIT Rourkela [email protected] Designing dynamic and
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
BPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION
Journal of Teaching and Education, CD-ROM. ISSN: 2165-6266 :: 03(02):175 183 (2014) Copyright c 2014 by UniversityPublications.net BPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION Vicente Cerverón-Lleó,
Software Requirements Specification
Software Requirements Specification (SRS v1.0) For Mobile Real Estate Project Prepared by D. Destan Sarpkaya Advisor Assist.Prof.Dr. Onur Demir Yeditepe University 2011 1 P a g e 1. Introduction a. Purpose
HPC Portal Development Platform with E-Business and HPC Portlets
HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: [email protected] Abstract HPC Portal Development
Creating Library Website Using Open Source Content Management System
Creating Library Website Using Open Source Content Management System Vimal kumar V. 1 and Deepak Sankar 2 1 Asian School of Business Technopark Trivandrum-695 581 [email protected] 2 Deepak Shankar Malayalam
A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Monitoring BPMN-Processes with Rules in a Distributed Environment
Monitoring BPMN-Processes with Rules in a Distributed Environment Lothar Hotz 1, Stephanie von Riegen 1, Lars Braubach 2, Alexander Pokahr 2, and Torsten Schwinghammer 3 1 HITeC e.v. c/o Fachbereich Informatik,
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Using Workflows in a Content Management System
Using Workflows in a Content Management System Hannon Hill Corporation 950 East Paces Ferry Road Suite 2440, Atlanta, GA 30326 www.hannonhill.com o: 678.904.6900 f: 678.904.6901 Table of Contents Workflow's
Framework as a master tool in modern web development
Framework as a master tool in modern web development PETR DO, VOJTECH ONDRYHAL Communication and Information Systems Department University of Defence Kounicova 65, Brno, 662 10 CZECH REPUBLIC [email protected],
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Introduction to Web Content Management Systems Site Development SYLLABUS FALL 2012
Introduction to Web Content Management Systems Site Development SYLLABUS FALL 2012 CSCI E-30, (23304; 23341) Last Updated: 7/16/2012 Course Description: In a rapidly changing world, the need for online
Typo3_tridion. SDL Tridion R5 3/21/2008
Product Last Updated System Requirements Application Server Approximate Cost Database License Operating System Programming Language Root Access Shell Access Web Server Security Audit Trail Captcha Content
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
WEB DEVELOPMENT IA & IB (893 & 894)
DESCRIPTION Web Development is a course designed to guide students in a project-based environment in the development of up-to-date concepts and skills that are used in the development of today s websites.
Link Analysis Tool Design Description Final Version
Link Analysis Tool Design Description Final Version Doc. No.: Revision History Date Version Description Author 2010-10-08 1.0 Initial Draft Hassan Aziz Khan 2010-11-06 1.1 2 nd Draft Hassan Aziz Khan
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
How To Manage Your Digital Assets On A Computer Or Tablet Device
In This Presentation: What are DAMS? Terms Why use DAMS? DAMS vs. CMS How do DAMS work? Key functions of DAMS DAMS and records management DAMS and DIRKS Examples of DAMS Questions Resources What are DAMS?
