Sciweavers

223 search results - page 23 / 45
» Secure Remote Access to an Internal Web Server
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 7 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
WWW
2010
ACM
14 years 2 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
COMPSAC
2003
IEEE
14 years 29 days ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
AI
2005
Springer
13 years 9 months ago
Integrating Web Content Clustering into Web Log Association Rule Mining
Abstract. One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which...
Jiayun Guo, Vlado Keselj, Qigang Gao