Sciweavers

819 search results - page 70 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
CORR
2008
Springer
111views Education» more  CORR 2008»
14 years 10 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
ACSAC
2000
IEEE
15 years 2 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
ICWE
2010
Springer
15 years 2 months ago
AWAIT: Efficient Overload Management for Busy Multi-tier Web Services under Bursty Workloads
:  AWAIT: Efficient Overload Management for Busy Multi-tier Web Services under Bursty Workloads Lei Lu, Ludmila Cherkasova, Vittoria de Nitto Persone, Ningfang Mi, Evgenia Smirn...
Lei Lu, Ludmila Cherkasova, Vittoria de Nitto Pers...
DEXAW
2006
IEEE
163views Database» more  DEXAW 2006»
15 years 3 months ago
ONTODELLA - A Projection and Linking Service for Semantic Web Applications
Content in semantic web portals is often projected along application specific navigational taxonomies and linked semantically. This paper presents a logic-based method and a serv...
Kim Viljanen, Teppo Kansala, Eero Hyvönen, Ee...
CIMCA
2006
IEEE
15 years 3 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet