Sciweavers

35 search results - page 3 / 7
» A Pattern-Driven Generation of Security Policies for Service...
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 1 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
ICWS
2009
IEEE
14 years 4 months ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...
JHSN
2006
95views more  JHSN 2006»
13 years 7 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
ACSAC
2007
IEEE
14 years 1 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo