Sciweavers

1140 search results - page 146 / 228
» A Purpose-Based Access Control Model
Sort
View
VTC
2008
IEEE
153views Communications» more  VTC 2008»
14 years 2 months ago
Improving Mobile IPv6 Handover in Wireless Network with E-HCF
— Mobile IP allows a mobile node to maintain a continuous connectivity to the Internet when moving from one access point to another. However, due to the link switching delay and ...
Anne Wei, Gouzhi Wei, Benoit Geller
BPM
2006
Springer
149views Business» more  BPM 2006»
13 years 10 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ICEB
2004
152views Business» more  ICEB 2004»
13 years 9 months ago
A Multi-Agent System for E-Business Processes Monitoring in a Web-Based Environment
In this paper, we present a multi-agent system MAGS for the e-business processes monitoring in a web-based environment. We classify the types of agents in MAGS by their monitoring...
Xinyu Zhao, Cen Wu, Runjie Zhang, Chen Zhao, Zuoqu...
RBAC
1998
84views more  RBAC 1998»
13 years 9 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
IEEESP
2008
136views more  IEEESP 2008»
13 years 8 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...