Sciweavers

COMPUTER
2008
60views more  COMPUTER 2008»
13 years 4 months ago
Key-Management Infrastructure for Protecting Stored Data
acting the infrastructure of a cryptographic system into three core components.
Luther Martin
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
13 years 8 months ago
A UML Profile for Core Components and their Transformation to XSD
In business-to-business e-commerce, traditional electronic data interchange (EDI) approaches such as UN/EDIFACT have been superseded by approaches like web services and ebXML. Nev...
Christian Huemer, Philipp Liegl