Sciweavers

4496 search results - page 630 / 900
» DACS Web Service
Sort
View
WMASH
2004
ACM
15 years 10 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
ICWS
2008
IEEE
15 years 6 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
MKWI
2008
113views Business» more  MKWI 2008»
15 years 6 months ago
A Rule-based Middleware for Business Process Execution
Abstract. While past research in service oriented computing has focused on the fairly static functional description and the operators of services the dynamic and flexible compositi...
Adrian Paschke, Alexander Kozlenkov
APSCC
2010
IEEE
15 years 3 months ago
Personalized Modeling for SaaS Based on Extended WSCL
Software as a service (SaaS) is an emerging software framework in which business data and logic typically integrate with other applications. It requires a unified subscriber to des...
Liu Ying, Zhang Bin, Liu Guoqi, Wang Deshuai, Gao ...