Sciweavers

687 search results - page 110 / 138
» A Self-Policing Policy Language
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
ACSAC
2007
IEEE
14 years 2 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
HPDC
2007
IEEE
14 years 2 months ago
Scalable, fault-tolerant management in a service oriented architecture
With the emergence of Service-based architectures, management of an application which comprises of a large number of distributed services becomes difficult as resources appear, mo...
Harshawardhan Gadgil, Geoffrey Fox, Shrideep Palli...
FOSAD
2007
Springer
14 years 1 months ago
Secure Service Orchestration
Abstract. We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a “call...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
AICT
2006
IEEE
210views Communications» more  AICT 2006»
14 years 1 months ago
Model-Based Analysis of Obligations in Web Service Choreography
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Howard Foster, Sebastián Uchitel, Jeff Mage...