Learn More
Enterprises are rapidly extending their relatively stable and internally-oriented business processes and applications with loosely-coupled enterprise software services in order to support highly dynamic, cross-organizational business processes. These services are no longer solely based on internal enterprise systems, but often implemented, deployed and(More)
Service-Oriented Computing is a new paradigm for the specification and deployment of distributed services in highly dynamic environments. The very nature of the context in which service-oriented computing thrives imposes unique security requirements. Large scale interconnection of systems and services, rapidly changing service compositions and ad-hoc(More)
Service oriented computing (SOC) demands an infrastructure that seamlessly integrates all connection points between business processes, services and associated support resources. Parts of the infrastructure may be supported by existing standards such as XACML and BPEL. However, an integral and sound framework that takes into account all these issues and(More)
Interoperability between enterprise applications requires an understanding of the obstacles to interoperability in order to provide methods for overcoming these obstacles. We address the problem from different angles: first, we investigate the benefit of multi-lingual ontologies to overcome language problems between users of an enterprise application.(More)
In this paper, we address the question whether security of service-oriented computing in general, and web services technology in particular, is adequately equipped for any interaction patterns that are not request-response, such as event-driven interactions. Taking into account the distributed nature of access control, we argue that serviceoriented(More)
Service Oriented Computing (SOC) demands a framework that seamlessly integrates all connection points between business processes, services and associated support resources. To address this challenge, we introduce the Event-driven Framework for Service Oriented Computing (EFSOC) that is organized in three tiers: the event tier, the business process tier, and(More)
Incorporating gamified simulations of cybersecurity breach scenarios in the form of Capture-The-Flag (CTF) sessions increases student engagement and leads to more well-developed skills. Furthermore, it enhances the confidence of students in their own abilities. Our argument is supported by a study in which undergraduate students taking a cybersecurity class(More)
  • 1