Sciweavers

1139 search results - page 140 / 228
» Trust Management Survey
Sort
View
IDTRUST
2009
ACM
14 years 2 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
ICIW
2009
IEEE
14 years 2 months ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair
GSEM
2007
Springer
14 years 2 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
RE
2007
Springer
14 years 2 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
KES
2004
Springer
14 years 1 months ago
Partial Merging of Semi-structured Knowledgebases
Automatizing the merging of knowledgebases is an important step towards more efficient knowledge management. The cases when two knowledgebases need to be merged completely into a m...
Ladislau Bölöni, Damla Turgut