Sciweavers

367 search results - page 48 / 74
» Authorization-Based Access Control for the Services Oriented...
Sort
View
GCC
2003
Springer
14 years 1 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
FTDCS
1997
IEEE
14 years 27 days ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
WETICE
1998
IEEE
14 years 28 days ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
ISORC
2002
IEEE
14 years 1 months ago
Service Differentiation in Real-Time Main Memory Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, stock trading, decision support, web information services, and data-i...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
FGCS
2006
114views more  FGCS 2006»
13 years 8 months ago
A semantic approach to discovering learning services in grid-based collaborative systems
CSCL systems can benefit from using grids since they offer a common infrastructure enabling the access to an extended pool of resources that can provide supercomputing capabilitie...
Guillermo Vega-Gorgojo, Miguel L. Bote-Lorenzo, Ed...