Sciweavers

744 search results - page 96 / 149
» The Traust Authorization Service
Sort
View
WIKIS
2006
ACM
15 years 3 months ago
Constrained Wiki: an Oxymoron?
In this paper we propose a new wiki concept — light constraints — designed to encode community best practices and domain-specific requirements, and to assist in their applica...
Angelo Di Iorio, Stefano Zacchiroli
EGC
2005
Springer
15 years 3 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
ITRUST
2005
Springer
15 years 3 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
EDOC
2002
IEEE
15 years 2 months ago
An MDA-Based Model for Vertical Application Task Forces: An Experience Report
Thispaper describes a set of modeling techniquesfor developing vertical applications in specific domains. Previous approaches are mainly focused on obtaining final applications. W...
Luis E. Anido-Rifón, Juan M. Santos, Judith...