Sciweavers

819 search results - page 40 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SAC
2009
ACM
14 years 2 months ago
Web-services in the dutch healthcare insurance sector: expected versus achieved benefits
The upcoming buzz words nowadays appear to be web service or open network environment [4]. This is the latest IT-technology to support business processes which is embraced by an i...
Hayley Bakker, Maria E. Iacob
FTDCS
1997
IEEE
13 years 11 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
ACSAC
2004
IEEE
13 years 11 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
MOBILITY
2009
ACM
14 years 2 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ACSC
2005
IEEE
14 years 1 months ago
A Programming Language for Web Service Development
There is now widespread acceptance of Web services and service-oriented architectures. But despite the agreement on key Web services standards there remain many challenges. Progra...
Dominic Cooney, Marlon Dumas, Paul Roe