-
1
-
-
38649110965
-
AMPol-Q: Adaptive Middleware Policy to Support QoS
-
Chicago, IL, December
-
R. N. Afandi, J. Zhang, and C. A. Gunter. AMPol-Q: Adaptive Middleware Policy to Support QoS. In International Conference on Service Oriented Computing(ICSOC), Chicago, IL, December 2006.
-
(2006)
International Conference on Service Oriented Computing(ICSOC)
-
-
Afandi, R.N.1
Zhang, J.2
Gunter, C.A.3
-
2
-
-
38649136319
-
AMPol: Adaptive Messaging Policy
-
Zurich, Switzerland, December, EEE
-
R. N. Afandi, J. Zhang, M. Hafiz, and C. A. Gunter. AMPol: Adaptive Messaging Policy. In European Conference on Web Services(ECOWS '06), Zurich, Switzerland, December 2006. EEE.
-
(2006)
European Conference on Web Services(ECOWS '06)
-
-
Afandi, R.N.1
Zhang, J.2
Hafiz, M.3
Gunter, C.A.4
-
3
-
-
39049096749
-
-
XACML references, 1.54, OASIS, May
-
XACML references. Technical Report v 1.54, OASIS, May 2005.
-
(2005)
Technical Report v
-
-
-
4
-
-
29744464022
-
-
Pearson Education
-
N. Bieberstein, R. Shah, K. Jones, S. Bose, and M. Fiammante. Service-Oriented Architecture COMPASS: Business Value, Planning, and Enterprise Roadmap. Pearson Education, 2005.
-
(2005)
Service-Oriented Architecture COMPASS: Business Value, Planning, and Enterprise Roadmap
-
-
Bieberstein, N.1
Shah, R.2
Jones, K.3
Bose, S.4
Fiammante, M.5
-
5
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. J. Comput. Secur., 10(3):241-271, 2002.
-
(2002)
J. Comput. Secur
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
6
-
-
33745767674
-
CPOL: High-performance policy evaluation
-
Virginia, ACM Press
-
K. Borders, X. Zhao, and A. Prakash. CPOL: high-performance policy evaluation. In CCS '05: 12th ACM Conference on Computer and Communications Security, Virginia, pages 147-157. ACM Press, 2005.
-
(2005)
CCS '05: 12th ACM Conference on Computer and Communications Security
, pp. 147-157
-
-
Borders, K.1
Zhao, X.2
Prakash, A.3
-
7
-
-
84902441769
-
Secure Role-based Messaging
-
Windermere, UK
-
D. Chadwick, G. Lunt, and G. Zhao. Secure Role-based Messaging. In CMS '04: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Windermere, UK, pages 263-275, 2004.
-
(2004)
CMS '04: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
, pp. 263-275
-
-
Chadwick, D.1
Lunt, G.2
Zhao, G.3
-
10
-
-
39049173099
-
-
eXtensible Access Control Markup Language (XACML). Technical Report v1.1, OASIS, August 2003.
-
eXtensible Access Control Markup Language (XACML). Technical Report v1.1, OASIS, August 2003.
-
-
-
-
14
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
Virginia, ACM
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah. First experiences using XACML for access control in distributed systems. In XMLSEC '03: ACM workshop on XML security, Virginia, pages 25-37. ACM, 2003.
-
(2003)
XMLSEC '03: ACM workshop on XML security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
15
-
-
33749070145
-
WSEmail: Secure internet messaging based on web services
-
Orlando FL, July, IEEE
-
K. D. Lux, M. J. May, N. L. Bhattad, and C. A. Gunter. WSEmail: Secure internet messaging based on web services. In International Conference on Web Services (ICWS '05), Orlando FL, July 2005. IEEE.
-
(2005)
International Conference on Web Services (ICWS '05)
-
-
Lux, K.D.1
May, M.J.2
Bhattad, N.L.3
Gunter, C.A.4
-
17
-
-
20444479906
-
A logic-based framework for attribute based access control
-
Washington DC, ACM
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In FMSE '04: ACM workshop on Formal methods in security engineering, Washington DC, pages 45-55. ACM, 2004.
-
(2004)
FMSE '04: ACM workshop on Formal methods in security engineering
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
18
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
20
-
-
39049137464
-
-
White Paper, Forrester Research Inc, January
-
N. Yuhanna, M. Gilpin, L. Hogan, and A. Sahalie. Information fabric: Enterprise data virtualization. White Paper, Forrester Research Inc., January 2006.
-
(2006)
Information fabric: Enterprise data virtualization
-
-
Yuhanna, N.1
Gilpin, M.2
Hogan, L.3
Sahalie, A.4
|