Sciweavers

744 search results - page 43 / 149
» The Traust Authorization Service
Sort
View
CN
2007
137views more  CN 2007»
14 years 9 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
XMLSEC
2003
ACM
15 years 3 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
MANSCI
2007
169views more  MANSCI 2007»
14 years 9 months ago
Performance Contracting in After-Sales Service Supply Chains
Performance-based contracting is reshaping service support supply chains in capital intensive industries such as aerospace and defense. Known as Power by the Hour in the private s...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine
IEEECIT
2005
IEEE
15 years 3 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
ERCIMDL
2007
Springer
74views Education» more  ERCIMDL 2007»
15 years 1 months ago
Named Entity Identification and Cyberinfrastructure
Well-established instruments such as authority files and a growing set of data structures such as CIDOC CRM, FRBRoo, and MODS provide the foundation for emerging, new digital servi...
Alison Babeu, David Bamman, Gregory Crane, Robert ...