Sciweavers

63 search results - page 4 / 13
» Negotiation of security services: a multi-criteria decision ...
Sort
View
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
ENTCS
2007
112views more  ENTCS 2007»
14 years 9 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
NGC
2007
Springer
120views Communications» more  NGC 2007»
14 years 9 months ago
End-to-End QoS Support for a Medical Grid Service Infrastructure
Quality of Service support is an important prerequisite for the adoption of Grid technologies for medical applications. The GEMSS Grid infrastructure addressed this issue by offer...
Siegfried Benkner, Gerhard Engelbrecht, Stuart E. ...
79
Voted
DEXA
2005
Springer
106views Database» more  DEXA 2005»
15 years 3 months ago
Personalized and Community Decision Support in eTourism Intermediaries
The rapidly growing web technologies and electronic commerce applications have stimulated the need of personalized and group decision support functionalities in eTourism intermedia...
Chien-Chih Yu