Sciweavers

1226 search results - page 126 / 246
» Service Oriented Security Architecture
Sort
View
SOFSEM
2009
Springer
15 years 2 months ago
Can Component/Service-Based Systems Be Proved Correct?
Component-oriented and service-oriented approaches have gained a strong enthusiasm in industries and academia with a particular interest for service-oriented approaches. The servic...
Christian Attiogbé
DANCE
2002
IEEE
15 years 3 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
WECWIS
2005
IEEE
128views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Comparison of Two Distinctive Model Driven Web Service Orchestration Proposals
The concept of MDA (model driven architecture) aims at the goal of longevity (through business logic and architecture migration between different platforms) and quality improvemen...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
IMF
2007
14 years 11 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 10 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...