Sciweavers

234 search results - page 18 / 47
» A security architecture for transient trust
Sort
View
WECWIS
1999
IEEE
116views ECommerce» more  WECWIS 1999»
13 years 11 months ago
Towards a Scalable PKI for Electronic Commerce Systems
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
Chenxi Wang, William A. Wulf
ATC
2006
Springer
13 years 9 months ago
Autonomic and Trusted Computing Paradigms
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-...
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson ...
JHSN
2006
96views more  JHSN 2006»
13 years 7 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
ACMSE
2008
ACM
13 years 9 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
ATC
2007
Springer
14 years 1 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...