Default Cover Image

11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007)

Oct. 15 2007 to Oct. 19 2007

Annapolis, MD

Table of Contents

Introduction
Message from General ChairFreely available from IEEE.pp. ix
Introduction
Additional reviewersFreely available from IEEE.pp. xiv
Introduction
Message from Program ChairsFreely available from IEEE.pp. x
Keynote [Bill Neugent biography]Full-text access may be available. Sign in or learn about subscription options.
Getting Rid of the OR-Join in Business Process ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 3-3
Introduction
Organizing CommitteeFreely available from IEEE.pp. xi
Introduction
Program CommitteeFreely available from IEEE.pp. xii
Keynote Speakers
Mircea Mihaescu Director, Technology and Innovation, CIO Office IBMFull-text access may be available. Sign in or learn about subscription options.pp. xvi
Session 1: Business Process Modeling and Management
Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPELFull-text access may be available. Sign in or learn about subscription options.pp. 15
Session 1: Business Process Modeling and Management
A Graphical Notation for Modeling Complex Events in Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 27
Adding Behavior to ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 169-169
Session 1: Business Process Modeling and Management
A Classification of Differences between Similar BusinessProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 37
Session 2: Middleware Frameworks
Implementing Business Conversations with Consistency Guarantees Using Message-Oriented MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 51
Session 2: Middleware Frameworks
Efficient Web Services Message Exchange by SOAP Bundling FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 63
Session 3: Security and Enterprise Computing
A Model-Driven Framework for Trusted Computing Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 75
Session 3: Security and Enterprise Computing
Building a Privacy-Preserving Benchmarking Enterprise SystemFull-text access may be available. Sign in or learn about subscription options.pp. 87
On Interoperability and Conformance Assessment in Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 229-229
Session 3: Security and Enterprise Computing
Self-Configuration of Network SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 97
Context Aware Differentiated Services Development with Configurable Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 241-241
Session 4: Enterprise Architecture
Business and IT Alignment with SEAM for Enterprise ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 111
Session 4: Enterprise Architecture
Structuring Software Cities A Multidimensional ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 122
Session 4: Enterprise Architecture
Enterprise Architecture: A Framework Supporting System Quality AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 130
Session 4: Enterprise Architecture
A Tool for Enterprise Architecture AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 142
Session 5: Modeling Enterprise Systems
UML Profiles for WS-Policy4MASC as Support for Business Value Driven Engineering and Management of Web Services and their CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 157
Session 5: Modeling Enterprise Systems
Modeling and Integrating Aspects into Component ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 181
Session 6: Policy and Enterprise Computing
An Analysis Framework for Mobile Workforce AutomationFull-text access may be available. Sign in or learn about subscription options.pp. 193
Session 6: Policy and Enterprise Computing
Towards A Service-Oriented Architecture for Demand-Driven e GovernmentFull-text access may be available. Sign in or learn about subscription options.pp. 214
Session 7: Architectural Models
Providing Support for Model Composition in MetamodelsFull-text access may be available. Sign in or learn about subscription options.pp. 253
Session 8: Workflow
Model Checking Data-Aware Workflow Properties with CTL-FO+Full-text access may be available. Sign in or learn about subscription options.pp. 267
Session 8: Workflow
Developing Workflow Engine for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 279
Session 8: Workflow
DECLARE: Full Support for Loosely-Structured ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 287
Session 9: Model-Driven Architecture
Automated Model-Based Configuration of Enterprise Java ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 301
Session 9: Model-Driven Architecture
Survey of Traceability Approaches in Model-Driven EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 313
Session 10: Electronic Contracts
TxQoS: A Contractual Approach for Transaction ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 327
Session 10: Electronic Contracts
Temporal Interaction Contracts for Components in a Distributed SystemFull-text access may be available. Sign in or learn about subscription options.pp. 339
Session 11: Business Process and Rules
Business Process Integration by Using General Rule Markup LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 353
An Enterprise Architecture Alignment Measure for Telecom Service DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 476-476
Session 11: Business Process and Rules
Patterns of Business Rules to Enable Agile Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 365
NFP-aware Semantic Web Services SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 484-484
Session 12: Requirements
An Experience of Reuse Based Requirements Engineering in ERP Implementation ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 379
Session 12: Requirements
Producing a Global Requirement Model from Multiple Requirement SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 390
Session 1: Secured Services
Incorporating Security Behaviour into Business Models Using a Model Driven ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 405
Session 1: Secured Services
Controlled Delegation in e-cheques Using Proxy SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 414
Session 2: Quality of Service
A Multi-Layer Security Enabled Quality of Service (QoS) Management ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 423
Session 2: Quality of Service
Rules and Ontology in Compliance ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 435
Session 2: Quality of Service
SOA Monitoring for Enterprise Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 443
Session 2: Quality of Service
Adaptive Service Level ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 451
Session 3: Requirements Based on Development and Strategic Planning
Model-Driven Engineering for Requirements AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 459
Session 3: Requirements Based on Development and Strategic Planning
The Integrated Strategic Information System Planning MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 467
Session 4: Policy in Enterprise Systems
From Business to IT with SEAM: The J2EE Pet Store ExampleFull-text access may be available. Sign in or learn about subscription options.pp. 495
Session 4: Policy in Enterprise Systems
Publishing of Interoperable Services and Processes in UDDIFull-text access may be available. Sign in or learn about subscription options.pp. 503
Session 4: Policy in Enterprise Systems
An EAI Pattern-Based Comparison of Spaces and MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 511
Author Index
Author IndexFreely available from IEEE.pp. 519
Showing 57 out of 57