Sciweavers

248 search results - page 32 / 50
» Enforcing Secure Service Composition
Sort
View
IWSEC
2010
Springer
14 years 8 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
WWW
2006
ACM
15 years 10 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...
104
Voted
ISSA
2004
14 years 11 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
SWS
2004
ACM
15 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ICSOC
2004
Springer
15 years 2 months ago
Flexible coordination of service interaction patterns
Service-oriented computing is meant to support loose relationships between organisations: Collaboration procedures on the application-level translate to interaction processes via ...
Christian Zirpins, Winfried Lamersdorf, Toby Baier