Sciweavers

579 search results - page 23 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
SOSP
2009
ACM
14 years 4 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
DISCEX
2003
IEEE
14 years 29 days ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
WETICE
2003
IEEE
14 years 28 days ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
DEBS
2007
ACM
13 years 11 months ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon