Sciweavers

289 search results - page 3 / 58
» Security requirements in service oriented architectures for ...
Sort
View
SAINT
2003
IEEE
13 years 10 months ago
Data Storage Requirements for the Service Oriented Computing
Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their...
Thomas Risse, Predrag Knezevic
ICDS
2009
IEEE
13 years 11 months ago
Security and User Guidelines for the Design of the Future Networked Systems
—Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. ...
Seppo Heikkinen, Sari Kinnari, Kari Heikkinen
PERCOM
2007
ACM
14 years 4 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
WISE
2003
Springer
13 years 10 months ago
Service-Oriented Computing: Concepts, Characteristics and Directions
Service-Oriented Computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC re...
Mike P. Papazoglou
AINA
2007
IEEE
13 years 11 months ago
Middleware for Ubiquitous Service-Oriented Spaces on the Web
Web services are todays preferred vehicle for creating service-oriented architectures (SOA). Due to the boom of personal networked devices, the Web also found its way to the mobil...
Geert Vanderhulst, Kris Luyten, Karin Coninx