Login / Signup

Whom to Trust? Generating WS-Security Policies Based on Assurance Information.

Ivonne ThomasRobert WarschofskyChristoph Meinel
Published in: ECOWS (2011)
Keyphrases
  • security policies
  • distributed systems
  • access control
  • computer systems
  • service oriented
  • database
  • real world
  • association rules
  • privacy concerns