Sciweavers

309 search results - page 37 / 62
» An Access-Control Framework for WS-BPEL
Sort
View
VTC
2008
IEEE
173views Communications» more  VTC 2008»
14 years 2 months ago
A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
Abstract—Cross-layer routing and scheduling algorithms design for wireless backhaul mesh network has attracted much research interest recently. The network is expected to support...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
WORDS
2005
IEEE
14 years 1 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
POLICY
2007
Springer
14 years 2 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
IFIP
2004
Springer
14 years 1 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
COMCOM
2002
143views more  COMCOM 2002»
13 years 7 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt