Sciweavers

1075 search results - page 57 / 215
» Access Control System Using Web Services for XML Messaging S...
Sort
View
CSFW
2009
IEEE
14 years 22 days ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
DAGSTUHL
2004
13 years 10 months ago
Audition of Web Services for Testing Conformance to Open Specified Protocols
Abstract. A Web Service (WS) is a type of component specifically conceived for distributed machine-to-machine interaction. Interoperability between WSs involves both data and messa...
Antonia Bertolino, Lars Frantzen, Andrea Polini, J...
WPES
2003
ACM
14 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
SOCA
2007
IEEE
14 years 3 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
ICOIN
2003
Springer
14 years 2 months ago
Periodic Communication Support in Multiple Access Networks Exploiting Token with Timer
Timed token medium access protocols are widely adopted in real-time multiple access networks because of bounded access time. However, timed token protocols inadequately provide per...
Young-yeol Choo, Cheeha Kim