Sciweavers

5273 search results - page 106 / 1055
» Secured Web Access
Sort
View
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 7 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
92
Voted
ACSAC
1999
IEEE
15 years 5 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
XMLSEC
2003
ACM
15 years 6 months ago
An XML-based approach to combine firewalls and web services security specifications
Marco Cremonini, Sabrina De Capitani di Vimercati,...
OOPSLA
1995
Springer
15 years 5 months ago
Problem-Oriented Object Memory: Customizing Consistency
Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Internal Acc...
Anders Kristensen, Colin Low
ICWS
2010
IEEE
15 years 3 months ago
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of messa...
Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid