Sciweavers

1863 search results - page 36 / 373
» Security Architecture for Web Services
Sort
View
INTR
2007
100views more  INTR 2007»
13 years 7 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
WECWIS
2008
IEEE
121views ECommerce» more  WECWIS 2008»
14 years 1 months ago
Semantic Web Service Composition for Service-Oriented Architectures
Semantic web service composition is about finding services from a repository that are able to accomplish a specified task. The task is defined in a form of a composition reques...
Thomas Weise, Steffen Bleul, Marc Kirchhoff, Kurt ...
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 1 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
ICWS
2004
IEEE
13 years 8 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin