Sciweavers

25 search results - page 1 / 5
» Security Policy Implementation Strategies for Common Carrier...
Sort
View
POLICY
2009
Springer
13 years 11 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 5 months ago
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental g...
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Shar...
ACSAC
2000
IEEE
13 years 9 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
COMPSAC
2008
IEEE
13 years 11 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
WWW
2004
ACM
14 years 5 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati