Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing latest articles
Browse All 6 View Live

Cooperative Secondary Authorization Recycling

As distributed enterprise systems scale up and become increasingly complex their authorization infrastructures are facing new challenges. Conventional request-response authorization architectures...

View Article



Cooperative Secondary Authorization Recycling

As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-response paradigm—are...

View Article

Cooperative Secondary Authorization Recycling

As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-response paradigm—are...

View Article

Cooperative Secondary Authorization Recycling

As enterprise systems, Grids, and other distributed applications scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-response paradigm—are...

View Article

Towards Improving the Availability and Performance of Enterprise...

Authorization protects application resources by allowing only authorized entities to access them. Existing authorization solutions are widely based on the request-response model, where a policy...

View Article


Toward Understanding Distributed Cognition in IT Security Management: The...

Information technology security management (ITSM) entails significant challenges, including the distribution of tasks and stakeholders across the organization, the need for security practitioners to...

View Article
Browsing latest articles
Browse All 6 View Live




Latest Images