Abstract. The architecture and integration of distributed applications increased in complexity over the last decades. It was Service Oriented Ar-chitecture (SOA) that answered most of the emerging questions by its ex-plicit and contract-based interface definitions for services and autonomous components. The exposed functionality can be used by anyone who has access to the public interface of SOA applications. Due to loose secu-rity handling, risks often emerge in SOA applications. Interfaces are usu-ally published to an unnecessarily wide set of clients. Although there are attempts to implement fine-grained access control mechanisms in object-oriented programming languages like Eiffel, C # and Java, these solutions are in-process that means...
Today the telecom world and the Internet world are converging. Ericsson has foreseen this convergenc...
The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the ...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
The service oriented architecture (SOA) is gaining more momen-tum with the advent of network service...
Abstract. Encapsulation is one of the most important features of object-oriented programming. Reduci...
We describe the design and implementation of a security in-frastructure for a distributed Java appli...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
Abstract: Service Oriented Architectures (SOA) promise a flexi-ble approach to utilize distributed c...
The specification of distributed service-oriented applications spans several levels of abstraction, ...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
This paper addresses the issues of authorization and trust in a federated distributed environment. W...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Today the telecom world and the Internet world are converging. Ericsson has foreseen this convergenc...
The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the ...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
The service oriented architecture (SOA) is gaining more momen-tum with the advent of network service...
Abstract. Encapsulation is one of the most important features of object-oriented programming. Reduci...
We describe the design and implementation of a security in-frastructure for a distributed Java appli...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
Abstract: Service Oriented Architectures (SOA) promise a flexi-ble approach to utilize distributed c...
The specification of distributed service-oriented applications spans several levels of abstraction, ...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
This paper addresses the issues of authorization and trust in a federated distributed environment. W...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Today the telecom world and the Internet world are converging. Ericsson has foreseen this convergenc...
The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the ...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...