Service Oriented Architecture (SOA) and Event Driven Architecture (EDA) are two acknowledged architectures for the development of business applications and information systems, which have evolved separately over the years. This paper proposes a solution for extending the SOA/Web Services Platform Architecture (WSPA) with support for business events and EDA concepts. Our solution enables services to act as event producers and event consumers. It also enables event-driven service orchestrations in business processes.
COBISS.SI-ID: 14364950
In this article, we will identify and investigate the major framework characteristics and individual differences that impact the most important users’ perceptions about frameworks. We performed an online survey and analyzed the results using structural equation modeling. The results support the technology acceptance model (TAM), which was used as an underlying theory. In addition, we found that framework characteristics and individual differences have a significant impact on users’ perceptions, especially in the case of voluntary framework use.
COBISS.SI-ID: 14599702
In this paper, we propose an efficient identity-based authenticated key agreement protocol employing pairings which employs a variant of a signature scheme and conforms to security attributes. Additionally, existing competitive and the proposed protocol are compared regarding efficiency and security. The criteria for efficiency are defined in this paper, whereas the criteria for security are defined by the fulfillment of security attributes from literature.
COBISS.SI-ID: 14779926
Framework-based development is currently regarded as one of the most promising software development approaches when it comes to improvements in lead time, productivity and quality. The objective of our research was to examine the major drivers that have an impact on a framework’s acceptance and a framework’s success. We used the TAM and Seddon’s information systems success model as our underlying theory. Our findings support the post-adoption version of TAM and the relationship between continuous use and the successful use of systems, where more use also means more net benefits.
COBISS.SI-ID: 13554710
The use of pairings has been shown promising for many two-party and three-party identity-based authenticated key agreement protocols. In recent years, several identity-based authenticated key agreement protocols have been proposed and most of them broken. In this paper, we propose two three-party identity-based authenticated key agreement protocols applying bilinear pairings. We show that the proposed protocols are secure (i.e. conform to defined security attributes) while being efficient.
COBISS.SI-ID: 13646102