Sciweavers

177 search results - page 24 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
119
Voted
SAINT
2005
IEEE
15 years 7 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
EGC
2005
Springer
15 years 7 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
OTM
2007
Springer
15 years 8 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
ECOOPW
1998
Springer
15 years 5 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
IJCIM
2007
82views more  IJCIM 2007»
15 years 1 months ago
Towards a classification framework for interoperability of enterprise applications
: Software applications interoperability is a challenge for modern enterprises. It needs establishing standards and protocols for data exchange between different enterprise systems...
Hervé Panetto