Sciweavers

505 search results - page 44 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 7 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 2 months ago
Weighted Fair Uplink/Downlink Access Provisioning in IEEE 802.11e WLANs
— We present the unfairness problem between the uplink and the downlink flows in the IEEE 802.11e infrastructure Basic Service Set (BSS) when the default settings of the Enhance...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
CSFW
1992
IEEE
13 years 12 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
ICWS
2010
IEEE
13 years 9 months ago
Two-Staged Approach for Semantically Annotating and Brokering TV-related Services
Nowadays, more and more distributed digital TV and TV-related resources are published on the Web, such as Electronic Personal TV Guide (EPG) data. To enable applications to access ...
Hong Qing Yu, Neil Benn, Stefan Dietze, Carlos Ped...