Sciweavers

744 search results - page 109 / 149
» The Traust Authorization Service
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
GLOBECOM
2008
IEEE
15 years 4 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
82
Voted
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 4 months ago
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise’s management executives. Such alignment is an organization-wide issue that...
Leonel Plazaola, Johnny Flores, Norman Vargas, Mat...
ICPP
2008
IEEE
15 years 4 months ago
A List-Based Strategy for Optimal Replica Placement in Data Grid Systems
—Data replications is a typical strategy for improving access performance and data availability in Data Grid systems. Current works on data replication in Grid systems focus on t...
Yi-Fang Lin, Jan-Jan Wu, Pangfeng Liu
IEEEARES
2008
IEEE
15 years 4 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...