Sciweavers

1927 search results - page 301 / 386
» An Access Control Model for Location based Services
Sort
View
COOPIS
2003
IEEE
15 years 6 months ago
Porting OMTTs to CORBA
The Common Object Request Broker Architecture standardizes a platform- and programming-language-independent distributed object computing environment. It also provides a standard fo...
Raul Silaghi, Alfred Strohmeier, Jörg Kienzle
CCGRID
2008
IEEE
15 years 3 months ago
Orchestrating Data-Centric Workflows
When orchestrating data-centric workflows as are commonly found in the sciences, centralised servers can become a bottleneck to the performance of a workflow; output from service i...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
ARCS
2004
Springer
15 years 7 months ago
Extending the MVC Design Pattern towards a Task-Oriented Development Approach for Pervasive Computing Applications
Abstract. This paper addresses the implementation of pervasive Java Web applications using a development approach that is based on the Model-ViewController (MVC) design pattern. We...
Patrick Sauter, Gabriel Vögler, Günther ...
ACISP
2001
Springer
15 years 6 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
POPL
2005
ACM
15 years 7 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...