Sciweavers

637 search results - page 42 / 128
» The Case for Abstracting Security Policies
Sort
View
SOSE
2006
IEEE
15 years 5 months ago
A Policy Framework for Collaborative Web Service Customization
Abstract: A web service usually serves many consumers, with each consumer having its specific functional or nonfunctional requirements. The web service should be customizable to me...
Haiqi Liang, Wei Sun, Xin Zhang, Zhong Bo Jiang
INFOCOM
2007
IEEE
15 years 6 months ago
Optimal Policies for Distributed Data Aggregation in Wireless Sensor Networks
Abstract— We consider the scenario of distributed data aggregation in wireless sensor networks, where each sensor can obtain and estimate the information of the whole sensing fi...
Zhenzhen Ye, Alhussein A. Abouzeid, Jing Ai
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 6 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
COORDINATION
2004
Springer
15 years 5 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...
ICUMT
2009
14 years 9 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio