Sciweavers

807 search results - page 39 / 162
» Term Rewriting for Access Control
Sort
View
NCA
2006
IEEE
15 years 8 months ago
A Distributed Architecture for Gracefully Degradable Web-Based Services
Modern Web sites provide multiple services that are often deployed through distributed architectures. The importance and the economic impact of Web-based services introduces signi...
Mauro Andreolini, Sara Casolari, Michele Colajanni
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 8 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
SAC
2008
ACM
15 years 1 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
MMMACNS
2010
Springer
15 years 11 days ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
TWC
2008
99views more  TWC 2008»
15 years 1 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan