Sciweavers

6844 search results - page 121 / 1369
» Web Service Security
Sort
View
ICWS
2008
IEEE
13 years 10 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 10 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
BROADNETS
2006
IEEE
14 years 3 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
IEEEARES
2007
IEEE
14 years 3 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer
KES
2007
Springer
14 years 3 months ago
DACS Web Service
DACS (Destination Addressing Control System) Scheme is developed as a new network management scheme. DACS Scheme performs the network management and services efficiently by commun...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...