Sciweavers

868 search results - page 91 / 174
» Resiliency policies in access control
Sort
View
IEEESCC
2008
IEEE
15 years 6 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
ICWE
2004
Springer
15 years 5 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
POLICY
2007
Springer
15 years 6 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
ICUMT
2009
14 years 9 months ago
A workflow on the dynamic composition and distribution of orchestration for testbed provisioning
Pan-European laboratory (Panlab) is based on a federation of distributed interconnected testbeds, providing access to platforms, networks and services for testing. Core components ...
Christos Tranoris, Spyros G. Denazis, Anastasius G...
SAC
2005
ACM
15 years 5 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla