نتایج جستجو برای: authorization

تعداد نتایج: 8242  

2005
Sarath Indrakanti Vijay Varadharajan

This paper considers the authorization service requirements for the service oriented architecture and proposes an authorization architecture for Web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure authorization of Web services as well as the support for the management of authorization information. The p...

2007
Valerio Venturi Morris Riedel Ahmed Shiraz Memon M. Shahbaz Memon Federico Stagni Bernd Schuller Daniel Mallmann Bastian Tweddell Alberto Gianoli Sven van den Berghe David F. Snelling Achim Streit

In recent years, the Virtual Organization Membership Service (VOMS) emerged within Grid infrastructures providing dynamic, fine-grained, access control needed to enable resource sharing across Virtual Organization (VOs). VOMS allows to manage authorization information in a VO scope to enforce agreements established between VOs and resource owners. VOMS is used for authorization in the EGEE and ...

2009
Haiyang Sun Jian Yang Xin Wang Yanchun Zhang

Message processing can become unsecured resulting in unreliable business collaboration in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a partner’s services or (2) messages transferred from one organization are processed by unqualified roles in other collaborating business participants. Therefore, verification mechanism based ...

Journal: :Journal of Computer and System Sciences 2014

Journal: :Journal of Medical Ethics 1995

Journal: :Proceedings of National Aviation University 2011

Journal: :Wilderness & Environmental Medicine 2018

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

2006
Enrique Rodriguez

Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید