Sciweavers

376 search results - page 2 / 76
» Integrity constraints in trust management
Sort
View
DAC
2009
ACM
13 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
BDIM
2008
IEEE
119views Business» more  BDIM 2008»
13 years 6 months ago
On integrating trust into business-driven management of web services and their compositions
This paper discusses why trust is an essential aspect for business-driven IT management, as well as how it impacts management of web services and their compositions. We summarize t...
Chern Har Yew, Vladimir Tosic, Hanan Lutfiyya
GSEM
2007
Springer
13 years 10 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
13 years 11 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
JTAER
2010
120views more  JTAER 2010»
13 years 3 months ago
Trust and Distrust in Adaptive Inter-enterprise Collaboration Management
The success and competitive edge of enterprises has become increasingly dependent on the enterprises’ agility to become members in business networks that support their own busin...
Sini Ruohomaa, Lea Kutvonen