Sciweavers

73 search results - page 5 / 15
» Consolidating the Access Control of Composite Applications a...
Sort
View
ECUMN
2004
Springer
13 years 11 months ago
A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision
In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through...
Daniel Won-Kyu Hong, Choong Seon Hong
IFIP
2009
Springer
13 years 5 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
JWSR
2008
145views more  JWSR 2008»
13 years 7 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
DSN
2008
IEEE
14 years 1 months ago
An integrated approach to resource pool management: Policies, efficiency and quality metrics
: The consolidation of multiple servers and their workloads aims to minimize the number of servers needed thereby enabling the efficient use of server and power resources. At the s...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Gui...
SACMAT
2003
ACM
14 years 21 days ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...