Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 18.

Add to Quick Collection   All 18 Results

Sort:
 Add All Items to Quick Collection
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1234137
Description: Mobile applications provide a wide range of e-mental health services to the users. A majority of the current mobile applications is not based on appropriate diagnostics. Most current applications offe ... More
Authors: Wang, Yi
Date: 2011
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/181781
Description: Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Computing, 2011.
Full Text: Full Text
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/114590
Description: A web service can be composed of multiple component web services in a loosely-coupled environment. Traditional Role Based Access Control (RBAC) is inadequate for the authorization management of compos ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/120124
Description: Accountability has become a key concern for management in recent years since the collapse of several large corporations in energy, communications and financial consulting industries. Traditionally, ac ... More
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26056
Description: Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless mobile devices. A mobil ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25893
Description: Business collaboration is about coordinating the flow of information among organizations and linking their business processes. However unique and challenging security issues concerning business collab ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26086
Description: In order to make business service more flexible and reusable, it is desirable to provide users or applications the same service but with different service quality, different interaction paths, or with ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26046
Description: Mobile agent technology and Web service technology compensate each other and play very important roles in e-service applications. The mechanism of Web services technology naturally provides a platform ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1140232
Description: This paper proposes an authorisation architecture for web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure a ... More
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25822
Description: Service oriented computing (SOC) has provided a promising architectural for business collaboration. However challenging security issues concerning business collaboration have arisen because of its dyn ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26096
Description: Service oriented computing (SOC) allows resources on a network to be made available as services. For a business service, differentiated services can be provided based on the usage context, i.e., locat ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25721
Description: The concept of trusted computing technology is becoming significant in that such technologies are being increasingly available in PCs and mobile devices. With the advent of this technology, one can mo ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/149742
Description: The concept of trusted platforms using trusted computing technology such as the Trusted Platform Module (TPM) is becoming significant in that such technologies are being increasingly available in PCs ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17906
Description: Nowadays in order to stay competitive, business needs to collaborate with each other to offer value added services. Collaborative business process development require loose coupling between individual ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/102691
Description: 8 page(s)
Reviewed: Reviewed