منابع مشابه
Architectures for Elastic Database Services
The emergence of cloud technologies has caused a profound disruption in the market for data management systems. The access to (virtually) unlimited computing resources has considerably changed the requirements towards data processing and storage systems. Specifically, properties such as scalability, elasticity, cost-efficiency, and ease of deployment are increasingly becoming critical success f...
متن کاملIntegrated Security System Based On Security Assertion Markup Language Standard
This paper describes an integrated security system for electronic-government services. Many governments are transforming manual government services to electronic government services. This transformation is in most cases done without involving users of the services. This makes users of these services have little trust in the e-government. Security is in most cases not addressed from the early st...
متن کاملWeb Services Security Architectures using Role- Based Access Control
The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Services with fine access granularity. The second approach is tailored to access control for conversation-based Web services and composite services; where in a Web Service is not considered as a se...
متن کاملManaged Security Services (MSS) based on Provisioned Security Services (PSS)
The paper discusses the reality of Managed Security Services today and their drawbacks. It then moves on to propose a solution to the most burning problems. The solution, Provisioned Security Services, is based on the premise that providing a strong provisioning platform, which automates processes and integrates into providers’ networks, will allow large providers to become key players in the a...
متن کاملIntegrated Security System for E-government Based on Saml Standard
This paper describes an integrated security system for electronic-government services. Many governments are transforming manual government services to electronic government services. This transformation is in most cases done without involving users of the services. This makes users of these services have little trust in the e-government. Security is in most cases not addressed from the early st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Internet Technology and Secured Transaction
سال: 2012
ISSN: 2046-3723
DOI: 10.20533/jitst.2046.3723.2012.0010