Sciweavers

985 search results - page 122 / 197
» Developing Secure Web Services for Computational Portals
Sort
View
150
Voted
POLICY
2001
Springer
15 years 8 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
150
Voted
WWW
2005
ACM
16 years 5 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
NDSS
1997
IEEE
15 years 8 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
IJIT
2004
15 years 5 months ago
Adaptive Algorithm to Predict the QoS of Web Processes and Workflows
Workflow Management Systems (WfMS) allow organizations to streamline and automate business processes and reengineer their structure. One important requirement for this type of syst...
Jorge Cardoso
ICSE
2004
IEEE-ACM
16 years 4 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...