Sciweavers

579 search results - page 34 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
IEEESCC
2010
IEEE
13 years 9 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
RTAS
2008
IEEE
14 years 2 months ago
Distributed Resource Kernels: OS Support for End-To-End Resource Isolation
The notion of resource reservation for obtaining real-time scheduling guarantees and enforcement of resource usage has gained strong support in recent years. However, much work on...
Karthik Lakshmanan, Raj Rajkumar
IEEEARES
2008
IEEE
14 years 2 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
ESORICS
2006
Springer
13 years 11 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong