Sciweavers

819 search results - page 111 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
MIDDLEWARE
2004
Springer
15 years 3 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
MM
2004
ACM
116views Multimedia» more  MM 2004»
15 years 3 months ago
A taxonomy for multimedia service composition
The realization of multimedia systems still heavily relies on building monolithic systems that need to be reengineered for every change in the application and little of which can ...
Klara Nahrstedt, Wolf-Tilo Balke
DBSEC
2006
124views Database» more  DBSEC 2006»
14 years 11 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
CCGRID
2006
IEEE
15 years 3 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
FIDJI
2004
Springer
15 years 3 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis