Sciweavers

704 search results - page 26 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
95
Voted
INFOCOM
1999
IEEE
15 years 4 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
ICCS
2007
Springer
15 years 6 months ago
Building a Dynamic Data Driven Application System for Hurricane Forecasting
The Louisiana Coastal Area presents an array of rich and urgent scientific problems that require new computational approaches. These problems are interconnected with common compon...
Gabrielle Allen
INTERNET
2002
175views more  INTERNET 2002»
15 years 4 days ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
114
Voted
TASE
2007
IEEE
15 years 6 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
98
Voted
IFIP
2009
Springer
14 years 10 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta