Sciweavers

586 search results - page 64 / 118
» A distributed service-oriented architecture for business pro...
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
ICS
2003
Tsinghua U.
15 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ICPADS
1997
IEEE
15 years 1 months ago
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
Mobile agents are no longer a theoretical issue since different architectures for their realization have been proposed. With the increasing market of electronic commerce it become...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
CCGRID
2001
IEEE
15 years 1 months ago
A DSM Cluster Architecture Supporting Aggressive Computation in Active Networks
Active networks allow computations to be performed innetwork at routers as messages pass through them. Active networks offer unique opportunities to optimize networkcentric applic...
Peter C. J. Graham
COLCOM
2008
IEEE
15 years 4 months ago
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems
In collaboration architectures, a computer must perform both processing and transmission tasks. Intuitively, it seems that these independent tasks should be executed in concurrent ...
Sasa Junuzovic, Prasun Dewan