Sciweavers

865 search results - page 20 / 173
» A Secure Information Flow Architecture for Web Services
Sort
View
SAC
2009
ACM
14 years 23 hour ago
Annotating UDDI registries to support the management of composite services
The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...
ETFA
2005
IEEE
14 years 29 days ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
ENTCS
2008
136views more  ENTCS 2008»
13 years 7 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
WINET
2002
138views more  WINET 2002»
13 years 7 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
WWW
2004
ACM
14 years 8 months ago
A web services architecture for learning object discovery and assembly
Courseware systems are often based on an assembly of different components, addressing the different needs of storage and delivery functionality. The Learning Technology Standard A...
Claus Pahl, Ronan Barrett