Sciweavers

169 search results - page 29 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
ANSOFT
2002
159views more  ANSOFT 2002»
13 years 7 months ago
Using Component-Based Development and Web Technologies to Support a Distributed Data Management System
Over recent years, "Internet-able" applications have been used to support domains where distributed functionality is essential. This flexibility is also pertinent in situ...
M. Brian Blake, Gail Hamilton, Jeffrey Hoyt
XMLSEC
2003
ACM
14 years 24 days ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh
EEE
2005
IEEE
14 years 1 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer
ACSAC
1999
IEEE
13 years 12 months ago
Non-repudiation Evidence Generation for CORBA using XML
This paper focuses on the provision of a nonrepudiation service for CORBA. The current OMG specification of a CORBA non-repudiation service forces the programmer to augment the ap...
Michael Wichert, David B. Ingham, Steve J. Caughey
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...