Sören Bittins

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Attribute-based Access Control (ABAC) policies are based on mutually processable policy attributes. Assigned permissions in such policies need to be reflected or combined with organisational constraints. Best practice in information security dictates having the operational need to access a particular information artifact independent from the function of the(More)
Seamless patient identification, as well as locating capabilities of remote services, are considered to be key enablers for large scale deployment of facilities to support the delivery of cross-border healthcare. This work highlights challenges investigated within the context of the Electronic Simple European Networked Services (e-SENS) large scale pilot(More)
The software development process utilized to implement enterprise systems using a component architecture in a distributed environment is well understood. The service oriented architecture enables the joint development of global and enterprise-wide solutions by several developers following enterprise-wide IT-strategies as coordinated by the customer.(More)
  • 1