Sciweavers

427 search results - page 28 / 86
» Policies: Giving Users Control over Calls
Sort
View
IEEEARES
2009
IEEE
14 years 4 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
COLCOM
2009
IEEE
14 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
ESORICS
2007
Springer
14 years 4 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
CSCW
2004
ACM
14 years 1 months ago
Leveraging social networks for information sharing
Saori is a computation infrastructure that enables users and enduser applications to leverage social networks to mediate information dissemination. Saori provides users with aware...
Jeremy Goecks, Elizabeth D. Mynatt
JSSPP
1995
Springer
14 years 1 months ago
A Microeconomic Scheduler for Parallel Computers
We describe a scheduler based on the microeconomic paradigm for scheduling on-line a set of parallel jobs in a multiprocessor system. In addition to increasing the system throughpu...
Ion Stoica, Hussein M. Abdel-Wahab, Alex Pothen