Sciweavers

721 search results - page 76 / 145
» A Logic-Based Access Control Approach For Web Services
Sort
View
121
Voted
CCS
2004
ACM
15 years 8 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
149
Voted
FAST
2009
15 years 16 days ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
90
Voted
ICMCS
2007
IEEE
93views Multimedia» more  ICMCS 2007»
15 years 9 months ago
POEMS: A Paper Based Meeting Service Management Tool
As more and more tools are developed for meeting support tasks, properly using these tools to get expected results becomes too complicated for many meeting participants. To addres...
Chang Hu, Qiong Liu, Xuemin Liu, Chunyuan Liao, Pa...
101
Voted
ITRUST
2005
Springer
15 years 8 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
116
Voted
ESORICS
2003
Springer
15 years 8 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu