Sciweavers

1739 search results - page 297 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 6 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
SACMAT
2009
ACM
15 years 6 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
ICDCS
2007
IEEE
15 years 6 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
INFOCOM
2005
IEEE
15 years 5 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
WEBI
2005
Springer
15 years 5 months ago
QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software
We present a generic natural language processing (NLP) architecture, acronym QTIL, based on a system of cooperating multiple agents (Q/A, T, I, and L agents) which can be used in ...
Vlado Keselj, Dawn N. Jutla