Kees Leune

Learn More
Service oriented computing (SOC) demands an infrastructure that seamlessly integrates all connection points between business processes, services and associated support resources. Parts of the infrastructure may be supported by existing standards such as XACML and BPEL. However, an integral and sound framework that takes into account all these issues and(More)
Enterprises are rapidly extending their relatively stable and internally-oriented business processes and applications with loosely-coupled enterprise software services in order to support highly dynamic, cross-organizational business processes. These services are no longer solely based on internal enterprise systems, but often implemented , deployed and(More)
Service-Oriented Computing is a new paradigm for the specification and deployment of distributed services in highly dynamic environments. The very nature of the context in which service-oriented computing thrives imposes unique security requirements. Large scale interconnection of systems and services, rapidly changing service compositions and ad-hoc(More)
Simulations and exercises have long been a tool that managers have had available to them to help keep staff in shape. The military is potentially the most proficient in using exercises to maintain skills through practical application in as close to real world situations as possible. In this paper, background on the evolution of cyber exercises and(More)
IT Security agents are often distributed geographically. Many team building techniques focus on groups who can gather physically and can do offsite activities together. IT Security collectives can improve their ability to work together if they engage in team building activities which can be done virtually. This paper describes the change in leader opinions(More)
In this paper, we address the question whether security of service-oriented computing in general, and web services technology in particular, is adequately equipped for any interaction patterns that are not request-response, such as event-driven interactions. Taking into account the distributed nature of access control, we argue that service-oriented(More)
Interoperability between enterprise applications requires an understanding of the obstacles to interoperability in order to provide methods for overcoming these obstacles. We address the problem from different angles: first, we investigate the benefit of multilingual ontologies to overcome language problems between users of an enterprise application.(More)