Sciweavers

1224 search results - page 28 / 245
» A Distributed Implementation of the Certified Information Ac...
Sort
View
CODASPY
2012
13 years 7 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
PERCOM
2009
ACM
15 years 6 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
ATAL
2008
Springer
15 years 1 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
107
Voted
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 6 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
79
Voted
IEEESCC
2008
IEEE
15 years 6 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu