Sciweavers

2250 search results - page 21 / 450
» Authorizing applications in singularity
Sort
View
ISCC
2005
IEEE
15 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
ICWS
2004
IEEE
14 years 11 months ago
Web Service Authorization Framework
Web Services represent an important technology for distributed applications and will replace various other technologies for distributed application development soon. A lot of prob...
Thomas Ziebermayr, Stefan Probst
CSE
2009
IEEE
14 years 7 months ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...
CCS
2000
ACM
15 years 2 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
COMPSAC
2001
IEEE
15 years 1 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss