Sciweavers

1089 search results - page 60 / 218
» Secure Cookies on the Web
Sort
View
ECOWS
2008
Springer
15 years 6 months ago
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
In this paper, we present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. We address a recent cryptogra...
Carlo Blundo, Emiliano De Cristofaro, Clemente Gal...
ACSAC
1999
IEEE
15 years 9 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
BPSC
2009
184views Business» more  BPSC 2009»
15 years 5 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
JOT
2006
80views more  JOT 2006»
15 years 4 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
91
Voted
ICC
2009
IEEE
122views Communications» more  ICC 2009»
15 years 11 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta