Sciweavers

25 search results - page 2 / 5
» Security Policy Implementation Strategies for Common Carrier...
Sort
View
CSSE
2004
IEEE
13 years 5 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
13 years 10 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
SOCIALCOM
2010
13 years 3 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu

Publication
198views
13 years 8 months ago
Real time policy based management of workflows for SLA Adherence
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
SACMAT
2003
ACM
13 years 10 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel