[图书][B] Security for web services and service-oriented architectures
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …
erent application environments. Web services based on the eXt-sible Markup Language …
Privacy preserving data analytics for smart homes
A Chakravorty, T Wlodarczyk… - 2013 IEEE Security and …, 2013 - ieeexplore.ieee.org
A framework for maintaining security & preserving privacy for analysis of sensor data from
smart homes, without compromising on data utility is presented. Storing the personally …
smart homes, without compromising on data utility is presented. Storing the personally …
Modelling security goals in business processes
C Wolter, M Menzel, C Meinel - 2008 - dl.gi.de
Various types of security goals, such as authentication or confidentiality, can be defined as
policies for process-aware information systems, typically in a manual fashion. Therefore, we …
policies for process-aware information systems, typically in a manual fashion. Therefore, we …
Communicating continuous integration servers for increasing effectiveness of automated testing
S Dösinger, R Mordinyi, S Biffl - Proceedings of the 27th IEEE/ACM …, 2012 - dl.acm.org
Automated testing and continuous integration are established concepts in today's software
engineering landscape, but they work in a kind of isolated environment as they do not fully …
engineering landscape, but they work in a kind of isolated environment as they do not fully …
[HTML][HTML] A domain-specific language for the specification of UCON policies
AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …
trivial system, these security policies go beyond simple access control rules and must cover …
Beyond paper and plastic: a meta-model for credential use and governance
ID cards, public transport tickets, and diplomas are examples of credentials that society has
established as a means to provide trustworthy information to others. In the digital world, the …
established as a means to provide trustworthy information to others. In the digital world, the …
Identity as a service–towards a service-oriented identity management architecture
C Emig, F Brandt, S Kreuzer, S Abeck - … Summer School and IFIP TC6. 6 …, 2007 - Springer
Abstract Service-oriented architecture (SOA) will form the basis of future information
systems. Web services are a promising way to implement SOA enabling the loose coupling …
systems. Web services are a promising way to implement SOA enabling the loose coupling …
Intelligent security and access control framework for service-oriented architecture
HFEL Yamany, MAM Capretz, DS Allison - Information and Software …, 2010 - Elsevier
One of the most significant difficulties with developing Service-Oriented Architecture (SOA)
involves meeting its security challenges, since the responsibilities of SOA security are based …
involves meeting its security challenges, since the responsibilities of SOA security are based …
System and method for performing access control
I Vlasov, P Misri, D Doongoor, MTJJ Chuan - US Patent 8,726,354, 2014 - Google Patents
BACKGROUND In computer system security, access control is often used as an approach to
restrict system access to authorized users. Role-based access control is a particular …
restrict system access to authorized users. Role-based access control is a particular …
Decision-feedback equalization and identification of linear channels using blind algorithms of the bussgang type
CB Papadias, A Paulraj - … Record of the Twenty-Ninth Asilomar …, 1995 - ieeexplore.ieee.org
We consider the problem of blind equalization of linear communication channels. Some
results indicate that the performance of Bussgang blind equalization algorithms can be …
results indicate that the performance of Bussgang blind equalization algorithms can be …