Sciweavers

234 search results - page 29 / 47
» Towards a Process for Web Services Security
Sort
View
ECBS
2007
IEEE
209views Hardware» more  ECBS 2007»
15 years 4 months ago
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...
OOPSLA
2001
Springer
15 years 2 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
MSWIM
2003
ACM
15 years 3 months ago
Parallel adaptive mobile web clipping
– Wireless mobile access to the Internet is an indispensable tool for private and corporate users alike; but both industry and academia recognize the need for better service. Imp...
Alex Vrenios
BIS
2008
86views Business» more  BIS 2008»
14 years 11 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
HOTOS
1997
IEEE
15 years 1 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad