Sciweavers

1075 search results - page 57 / 215
» Access Control System Using Web Services for XML Messaging S...
Sort
View
144
Voted
CSFW
2009
IEEE
15 years 6 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
DAGSTUHL
2004
15 years 4 months ago
Audition of Web Services for Testing Conformance to Open Specified Protocols
Abstract. A Web Service (WS) is a type of component specifically conceived for distributed machine-to-machine interaction. Interoperability between WSs involves both data and messa...
Antonia Bertolino, Lars Frantzen, Andrea Polini, J...
121
Voted
WPES
2003
ACM
15 years 7 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
139
Voted
SOCA
2007
IEEE
15 years 9 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
113
Voted
ICOIN
2003
Springer
15 years 7 months ago
Periodic Communication Support in Multiple Access Networks Exploiting Token with Timer
Timed token medium access protocols are widely adopted in real-time multiple access networks because of bounded access time. However, timed token protocols inadequately provide per...
Young-yeol Choo, Cheeha Kim