Proceedings of the IEEE Symposium on Emerging Technologies, 2005.
DOI: 10.1109/icet.2005.1558935
|View full text |Cite
|
Sign up to set email alerts
|

Comparative analysis and design philosophy of next generation unified enterprise application security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…This study describes the specifics of access control management, a vision, and arguments for federated access control management solutions in a business network. Research on the enterprisewide security is richly available, for example Shaikh et al provide a comparative analysis of existing IAM products and envision future needs of a next generation unified enterprise application security [20]. The works on the IAM in the area of virtual organizations especially using the service oriented architecture relate to the subject of our research and match the current setting of the industrial case [5, 91. For example Weaver proposed a distributed data security via web services, trust and federation techniques for manufacturing and process industries [21].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…This study describes the specifics of access control management, a vision, and arguments for federated access control management solutions in a business network. Research on the enterprisewide security is richly available, for example Shaikh et al provide a comparative analysis of existing IAM products and envision future needs of a next generation unified enterprise application security [20]. The works on the IAM in the area of virtual organizations especially using the service oriented architecture relate to the subject of our research and match the current setting of the industrial case [5, 91. For example Weaver proposed a distributed data security via web services, trust and federation techniques for manufacturing and process industries [21].…”
Section: Related Work and Motivationmentioning
confidence: 99%