Five examples of web-services for illustrating requirements for security architecture
Paper
Paper/Presentation Title | Five examples of web-services for illustrating requirements for security architecture |
---|---|
Presentation Type | Paper |
Authors | Addie, Ronald G. (Author), Moffatt, Sam (Author), Dekeyser, Stijn (Author) and Colman, Alan (Author) |
Editors | Zhang, Ji and Livraga, Giovanni |
Journal or Proceedings Title | Proceedings of the 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011) |
ERA Conference ID | 50549 |
Number of Pages | 8 |
Year | 2011 |
Place of Publication | Piscataway, NJ. United States |
ISBN | 9781457708657 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/ICDKE.2011.6053929 |
Web Address (URL) of Paper | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6053929 |
Conference/Event | 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011) |
International Conference on Data and Knowledge Engineering | |
Event Details | 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011) Event Date 06 to end of 08 Sep 2011 Event Location Milan, Italy |
Event Details | International Conference on Data and Knowledge Engineering ICDKE |
Abstract | The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary |
Keywords | web-services; web-security; XACML; computational complexity; security architecture |
ANZSRC Field of Research 2020 | 460507. Information extraction and fusion |
460612. Service oriented computing | |
460499. Cybersecurity and privacy not elsewhere classified | |
Public Notes | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | Department of Mathematics and Computing |
Swinburne University of Technology | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q106v/five-examples-of-web-services-for-illustrating-requirements-for-security-architecture
Download files
2517
total views751
total downloads6
views this month2
downloads this month