Sciweavers

2442 search results - page 303 / 489
» Secure Service Orchestration
Sort
View
ICWS
2008
IEEE
15 years 5 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 5 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
ICWS
2004
IEEE
15 years 5 months ago
JClarens: A Java Based Interactive Physics Analysis Environment for Data Intensive Applications
In this paper we describe JClarens; a Java based implementation of the Clarens remote data server. JClarens provides web services for an interactive analysis environment to dynami...
Arshad Ali, Ashiq Anjum, Tahir Azim, Michael Thoma...
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 4 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
148
Voted
PE
2007
Springer
154views Optimization» more  PE 2007»
15 years 3 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...