Sciweavers

4330 search results - page 141 / 866
» Analyzing security architectures
Sort
View
ITIIS
2008
91views more  ITIIS 2008»
15 years 5 months ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...
FI
2011
96views more  FI 2011»
15 years 3 days ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
WICSA
2007
15 years 6 months ago
Assessing a Multi-Site Development Organization for Architectural Compliance
Multi-site development organizations require coordination and communication efforts between different sites to ensure successful distributed development. These efforts need to be ...
Viktor Clerc, Patricia Lago, Hans van Vliet
136
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
Jimmy McGibney, Dmitri Botvich
IEEEARES
2006
IEEE
15 years 11 months ago
An Architecture for Service Discovery Based on Capability Matching
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic serviceoriented systems, such as Grids. Simple service indices do not ad...
Jaka Mocnik, Piotr Karwaczynski