Sciweavers

2644 search results - page 123 / 529
» Emerging Technology
Sort
View
WETICE
1998
IEEE
15 years 8 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
WETICE
1998
IEEE
15 years 8 months ago
A Framework for Adaptive Process Modeling and Execution (FAME)
This paper describes the architecture and concept of operation of a Framework for Adaptive Process Modeling and Execution (FAME). The research addresses the absence of robust meth...
Perakath C. Benjamin, Madhav Erraguntla, Richard J...
WETICE
1998
IEEE
15 years 8 months ago
Setting up a Secure Web Server and Clients on an Intranet
This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure ...
Joris Claessens, Mark Vandenwauver, Bart Preneel, ...
WETICE
1998
IEEE
15 years 8 months ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
WETICE
1998
IEEE
15 years 8 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes