Search For:

Displaying 1-5 out of 5 total
Flexible Persistence Support for State Machine-Based Workflow Engines
Found in: Software Engineering Advances, International Conference on
By Thomas Weigold, Thorsten Kramp, Peter Buhler
Issue Date:September 2009
pp. 313-319
This paper introduces a flexible persistence model for state machine workflows. In contrast to the persistence support in contemporary process definition languages and corresponding workflow engines we propose a model where, firstly, an arbitrary number of...
 
Remote Client Authentication
Found in: IEEE Security and Privacy
By Thomas Weigold, Thorsten Kramp, Michael Baentsch
Issue Date:July 2008
pp. 36-43
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each m...
 
Advanced Grid Programming with Components: A Biometric Identification Case Study
Found in: Computer Software and Applications Conference, Annual International
By Thomas Weigold, Peter Buhler, Jeyarajan Thiyagalingam, Artie Basukoski, Vladimir Getov
Issue Date:August 2008
pp. 401-408
Component-oriented software development has been attracting increasing attention for building complex distributed applications. A new infrastructure supporting this advanced concept is our prototype component framework based on the Grid component model. Th...
 
ePVM - An Embeddable Process Virtual Machine
Found in: Computer Software and Applications Conference, Annual International
By Thomas Weigold, Thorsten Kramp, Peter Buhler
Issue Date:July 2007
pp. 557-564
<p>At the heart of every business process management system resides a workflow engine, here termed process execution engine. Yet despite playing such a central role, contemporary business process engines generally still leave much to be desired in te...
 
Secure Internet Banking Authentication
Found in: IEEE Security and Privacy
By Alain Hiltgen, Thorsten Kramp, Thomas Weigold
Issue Date:March 2006
pp. 21-29
This article classifies common Internet banking authentication methods regarding potential threats and their level of security against common credential stealing and channel breaking attacks, respectively. The authors present two challenge/response Interne...
 
 1