Sciweavers

273 search results - page 25 / 55
» Access control enforcement for conversation-based web servic...
Sort
View
IEEESCC
2007
IEEE
14 years 1 months ago
Composing Integrated Systems Using GUI-Based Applications And Web Services
— Integrated systems are composed of components that exchange information (i.e., interoperate [5]). These components include Graphical User Interface (GUI) APplications (GAPs) an...
Mark Grechanik, Kevin M. Conroy
EDBT
2008
ACM
129views Database» more  EDBT 2008»
14 years 7 months ago
Design of PriServ, a privacy service for DHTs
By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data ...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...
CNIS
2006
13 years 8 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller
CCS
2008
ACM
13 years 9 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
PERCOM
2005
ACM
14 years 7 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste