Sciweavers

744 search results - page 7 / 149
» The Traust Authorization Service
Sort
View
ACC
2011
164views more  ACC 2011»
13 years 9 months ago
IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services
Once some stable solutions appear to be found at physical and network layers for cooperative Intelligent Transportation Systems (ITS), deploying vehicular services and managing the...
Andrés Garcia, José Santa, Antonio M...
74
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
67
Voted
ACSAC
2008
IEEE
15 years 4 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
69
Voted
EUROPKI
2007
Springer
15 years 3 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
JCIT
2007
142views more  JCIT 2007»
14 years 9 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal