Sciweavers

210 search results - page 17 / 42
» Policy Compliance in Collaborative Systems
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 1 days ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
ETRICS
2006
15 years 3 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
CSE
2009
IEEE
15 years 3 months ago
Self-Adaptation of Fault Tolerance Requirements Using Contracts
Fault tolerance is a constant concern in data centers where servers have to run with a minimal level of failures. Changes on the operating conditions or on server demands, and var...
André Luiz B. Rodrigues, Leila N. Bezerra, ...
SAJ
2002
97views more  SAJ 2002»
14 years 11 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...