Sciweavers

163 search results - page 23 / 33
» Specifying and enforcing constraints in role-based access co...
Sort
View
RIDE
1999
IEEE
13 years 11 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
POPL
1992
ACM
13 years 11 months ago
Semantic Foundations of Jade
Jade is a language designed to support coarse-grain parallelism on both shared and distributed addressspace machines. Jade is data-oriented: a Jade programmer simply augments a se...
Martin C. Rinard, Monica S. Lam
ESAW
2008
Springer
13 years 9 months ago
Peer Pressure as a Driver of Adaptation in Agent Societies
We consider a resource access control scenario in an open multi-agent system. We specify a mutable set of rules to determine how resource allocation is decided, and minimally assum...
Hugo Carr, Jeremy V. Pitt, Alexander Artikis
IJISEC
2002
52views more  IJISEC 2002»
13 years 7 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...