Sciweavers

1288 search results - page 67 / 258
» Securing aspect composition
Sort
View
ENTCS
2007
112views more  ENTCS 2007»
13 years 9 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
FEDCSIS
2011
90views more  FEDCSIS 2011»
12 years 8 months ago
Services Composition Model for Home-Automation peer-to-peer Pervasive Computing
—Collaborative mechanisms between services are a crucial aspect in the recent development of pervasive computing systems based on the paradigm of service-oriented architecture. C...
Juan A. Holgado-Terriza, Sandra Rodríguez-V...
JUCS
2008
162views more  JUCS 2008»
13 years 9 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 3 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho