Sciweavers

819 search results - page 66 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
USENIX
2007
15 years 2 days ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
SAC
2010
ACM
15 years 4 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
ICAC
2005
IEEE
15 years 3 months ago
Self-Adjusting Trust and Selection for Web Services
Service-oriented architectures enable services to be dynamically selected and integrated at runtime, thus enabling system flexibility and adaptiveness—autonomic attributes that...
E. Michael Maximilien, Munindar P. Singh
IEEESCC
2009
IEEE
15 years 4 months ago
A Service Oriented Architecture for Personalized Rich Media Delivery
Multimedia streaming means delivering continuous data to a plethora of client devices. Besides the actual data transport this also needs a high degree of content adaptation respec...
Sascha Tönnies, Benjamin Köhncke, Patric...
IEEESCC
2008
IEEE
15 years 4 months ago
Tourism, Peer Production, and Location-Based Service Design
This paper describes characteristics of information and service design by exploring the needs and motivations of tourists. Tourists are expected to be important and demanding user...
Eric Kansa, Erik Wilde