• Aucun résultat trouvé

[PDF] Top 20 Federated Access Control in Service Oriented Architecture

Has 10000 "Federated Access Control in Service Oriented Architecture" found on our website. Below are the top 20 most common "Federated Access Control in Service Oriented Architecture".

Federated Access Control in Service Oriented Architecture

Federated Access Control in Service Oriented Architecture

... The access control of the shared services becomes an essential requirement for a secure federation of ...once in an organization and to access the services of others with his autho- rization ... Voir le document complet

10

A Model-Driven approach for Collaborative Service-Oriented Architecture design

A Model-Driven approach for Collaborative Service-Oriented Architecture design

... topics in the domain of ...for Service-Oriented Architecture) (Benguria et ...order in terms of actions, control flows and interactions between services), information (related to ... Voir le document complet

48

"An Alternative Access Control Architecture for IP over ATM Networks"

"An Alternative Access Control Architecture for IP over ATM Networks"

... of Service) applying to these flows. Communications are connection oriented and a signaling protocol is used to set up, control and release ...connections. In this article we show that the ... Voir le document complet

15

"An Asynchronous Distributed Access Control Architecture For IP Over ATM Networks"

"An Asynchronous Distributed Access Control Architecture For IP Over ATM Networks"

... structure in order to explain how access control rules are ...shown in figure 4 an agent is made up of two main ...to access control management whereas the second part provides ... Voir le document complet

9

Automatic Error Finding in Access-Control Policies

Automatic Error Finding in Access-Control Policies

... policies in M OHAWK ’s input language to both SMV and RBAC-PAT input ...assignment. In our evaluation, we had two users for each policy, namely the user in the safety question and the ... Voir le document complet

14

Reliability and Quality of Service in Opportunistic Spectrum Access

Reliability and Quality of Service in Opportunistic Spectrum Access

... spectrum access Zhao et Sadler (2007), the idea of using spectrum holes or spectrum opportunities to deploy new networks was ...vacant in a specific time and geographic area Haykin (2005) and can be ... Voir le document complet

247

Engineering of Service Oriented Collaborative Network

Engineering of Service Oriented Collaborative Network

... Keywords: Service oriented enterprise, Collaborative networks analysis, Collaboration scenario, Engineering ...Introduction In the paradigm of service-oriented enterprises, the dynamic ... Voir le document complet

9

An analysis of service oriented architectures

An analysis of service oriented architectures

... One can harness the power of old existing software components with newer components which may be built with newer tools to provide the customer a composite application that [r] ... Voir le document complet

96

Access control in IoT environments: Feasible scenarios

Access control in IoT environments: Feasible scenarios

... participate in the access control decisions such as presented in the Figure ...2. In this approach, a server receives a request from the mobile user who wants to access the ... Voir le document complet

7

Information Access Assistant Service (IAAS)

Information Access Assistant Service (IAAS)

... adaptations in many fields including ...done in IAAS. Firstly, in IAAS the recommendations and adaptations of list of documents are made to group of users by ...users. In opposite the systems ... Voir le document complet

5

Dependability Issues in a Robot Control Architecture

Dependability Issues in a Robot Control Architecture

... LAAS architecture for autonomous mobile robots and some recent de- velopments to improve the dependability of the ...system. In particular, this paper focuses on the role of the Execution Control ... Voir le document complet

9

Model-based control-oriented scenario construction in tokamaks

Model-based control-oriented scenario construction in tokamaks

... discussion In this chapter, we have tested for the first time FF coils currents waveforms from an inverse evolution calculation with ...FEEQS.M in a real ...pulse in WEST, which may be beneficial to ... Voir le document complet

139

Automating Fine Concurrency Control in Object-Oriented Databases

Automating Fine Concurrency Control in Object-Oriented Databases

... concurrency control to object-oriented ...write access modes on instances may lead to less parallelism than in relational databases! This paper cope with that issue, and advantages are ... Voir le document complet

9

Field-oriented control of DFIG in Wind Turbine

Field-oriented control of DFIG in Wind Turbine

... II. V ARIABLE SPEED WIND TURBINE CONCEPT The typical DFIG configuration, illustrated in Fig.1 consists of a wound rotor induction generator (WRIG) with the stator windings directly connected to the three-phase ... Voir le document complet

6

Process specification framework in a service oriented holonic manufacturing system

Process specification framework in a service oriented holonic manufacturing system

... and Service-oriented Architectures have been proposed as solutions for the conception of flexible and reactive ...ed in the system which can limit the flexibility of higher levels strategies as ... Voir le document complet

9

Service oriented computing from the user perspective

Service oriented computing from the user perspective

... participation in content creation, have encouraged the idea of enabling the user to create and publish new services by composing existing ...user service creation. The goal is to really reach the user ... Voir le document complet

4

Service-Oriented Computing for intelligent train maintenance

Service-Oriented Computing for intelligent train maintenance

... proposed in (Desforges, Habbadi, and Archimède 2011 ...and in managing their maintenance according to their current and future health states (Xia et ...activities in capacity intensive industries ... Voir le document complet

25

A process oriented approach to service concepts

A process oriented approach to service concepts

... des service basée sur une approche orientée processus, permettant de discuter la portée de certaines caractéristiques généralement associées aux ...de service du double point de vue du consommateur et du ... Voir le document complet

6

Virtual Commissioning-Based Development and Implementation of a Service-Oriented Holonic Control for Retrofit Manufacturing Systems

Virtual Commissioning-Based Development and Implementation of a Service-Oriented Holonic Control for Retrofit Manufacturing Systems

... assembled in any position (X, Y, Z and W ...available in four colours: red, green, yellow and ...alternative in order to illustrate, in a very simple manner, the dependencies between the ... Voir le document complet

11

"Manageable parameters to improve access control in ATM networks"

"Manageable parameters to improve access control in ATM networks"

... Most of the solutions proposed to secure the ATM model rely on the use of cryptography. Cryptography is a very powerful tool to provide services like confidentiality, authentication, integrity and some kind of ... Voir le document complet

11

Show all 10000 documents...