Sciweavers

2517 search results - page 389 / 504
» Secure Deployment of Components
Sort
View
DEXAW
1998
IEEE
82views Database» more  DEXAW 1998»
14 years 1 months ago
User Authentication in Multidatabase Systems
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for ...
Eyk Hildebrandt, Gunter Saake
JAVA
1999
Springer
14 years 1 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 10 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
ICWS
2008
IEEE
13 years 10 months ago
A Dependable Infrastructure for Cooperative Web Services Coordination
A current trend in the web services community is to define coordination mechanisms to execute collaborative tasks involving multiple organizations. Following this tendency, this w...
Eduardo Adílio Pelinson Alchieri, Alysson N...
IASTEDSEA
2004
13 years 10 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling