Title | ||
---|---|---|
Five examples of web-services for illustrating requirements for security architecture. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/ICDKE.2011.6053929 | ICDKE |
Keywords | Field | DocType |
first order logic,web services,security architecture,computational complexity,service oriented architecture,expressive power,access control,computer architecture,web service | Data mining,Computer science,Computer security,XACML,First-order logic,Access control,Web service,Enterprise information security architecture,Expressive power,Service-oriented architecture,Database,Computational complexity theory | Conference |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ronald G. Addie | 1 | 39 | 6.33 |
Sam Moffatt | 2 | 1 | 1.03 |
Stijn Dekeyser | 3 | 113 | 23.14 |
Alan W. Colman | 4 | 16 | 2.79 |