Sciweavers

2454 search results - page 159 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CIIT
2007
131views Communications» more  CIIT 2007»
15 years 3 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
IEEECIT
2005
IEEE
15 years 7 months ago
Web Service Interactions: Analysis and Design
Abstract The conversation model captures interactions among the components of a composite web service. A conversation is the global sequence of messages exchanged among the compone...
Jianwen Su
OTM
2007
Springer
15 years 7 months ago
Trust Management Model and Architecture for Context-Aware Service Platforms
The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provis...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
CCS
2011
ACM
14 years 1 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
IEEEARES
2009
IEEE
15 years 8 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...