3 research outputs found

    An empirical evaluation for business process tools

    Get PDF
    As the use of web grows, organizations are increasingly choosing to use it to provide their services. The modeling process is a previous step in the systematization of a process. Due to the great number of modeling tools in existence, it is necessary to identify the information that tools allow to specify. A set of concepts is proposed to evaluate modeling tools using three levels of abstractions. The proposal compares the modeling capabilities supplied by the different techniques and allows determining what modeling tool is the most appropriate to model specific concepts of interest to a problem.1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 2: Software ModelingRed de Universidades con Carreras en Informática (RedUNCI

    An empirical evaluation for business process tools

    Get PDF
    As the use of web grows, organizations are increasingly choosing to use it to provide their services. The modeling process is a previous step in the systematization of a process. Due to the great number of modeling tools in existence, it is necessary to identify the information that tools allow to specify. A set of concepts is proposed to evaluate modeling tools using three levels of abstractions. The proposal compares the modeling capabilities supplied by the different techniques and allows determining what modeling tool is the most appropriate to model specific concepts of interest to a problem.1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 2: Software ModelingRed de Universidades con Carreras en Informática (RedUNCI

    Organisational and cross-organisational identity management

    Get PDF
    We are all familiar with the overwhelming number of usernames and passwords needed in our daily life in the networked world. Services need to identify their end users and keep record on them. Traditionally, this has been done by providing the end user with an extra username and password for each new service. Managing all these isolated user identities is painful for the end user and work-intensive for the service owner. Having out-of-date user accounts and privileges is also a security threat for an organisation. Identity management refers to the process of representing and recognising entities as digital identities in computer networks. In an organisation, an end user s identity has a lifecycle. An identity is created when the user enters the organisation; for example, a new employee is hired, a student is admitted in a school or a company gets a new customer. Changes in the end user s affiliation to the organisation are reflected to his identity, and when the end user departs, his identity needs to be revoked. Organisational identity management develops and maintains an architecture that supports maintenance of user identities during their life cycle. In crossorganisational identity management, these identities are used also when accessing services that are outside the organisation. This thesis studies identity management in organisational and cross-organisational services. An organisation s motivations for improving identity management are presented. Attention is paid to how the person registries in an organisation should be interconnected to introduce an aggregated view on an end user s identity. Connection between identity management and introduction of more reliable authentication methods is shown. The author suggests what needs to be taken into account in a usable deployment of single sign-on and PKI for authentication. Federated identity management is a new way to implement end user identity management in services that cross organisational boundaries. This thesis studies how to establish a federation, an association of organisations that wants to exchange information about their users and services to enable cross-organisational collaborations and transactions. The author presents guidelines for organising a federation and preserving an end user s privacy in it. Finally, common use scenarios for federated identity management are presented
    corecore