Sciweavers

67 search results - page 11 / 14
» Contract-Based Security Monitors for Service Oriented Softwa...
Sort
View
ICAC
2009
IEEE
13 years 10 months ago
A decentralized, architecture-based framework for self-growing applications
In large-scale, distributed software systems, an important management undertaking concerns the creation and runtime modification of application instances. This short paper propose...
Ada Diaconescu, Philippe Lalanda
SACMAT
2005
ACM
13 years 11 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
WIAS
2010
102views more  WIAS 2010»
13 years 4 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
JHSN
2006
267views more  JHSN 2006»
13 years 6 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
SACMAT
2011
ACM
12 years 9 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...