Sciweavers

4330 search results - page 64 / 866
» Analyzing security architectures
Sort
View
DAC
1998
ACM
15 years 11 months ago
Data Security for Web-based CAD
Scott Hauck, Stephen Knol
108
Voted
AGENTS
1997
Springer
15 years 2 months ago
Fusing Autonomy and Sociability in Robots
Quoting somerobotic examples, I willlist some key issues in fusing autonomy and sociability: tools and control architecture, attention, behavior matching, embodiment, similarity, ...
Yasuo Kuniyoshi
ESSOS
2011
Springer
14 years 1 months ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
IEEEARES
2010
IEEE
15 years 3 months ago
A Semantic Security Architecture for Web Services
—The shift from mere service-oriented architectures (SOA) to semantically enriched approaches is especially being forced in multi-domain environments that the public sector in th...
Stefan Durbeck, Christoph Fritsch, Günther Pe...
APSCC
2009
IEEE
15 years 5 months ago
Security meta-services orchestration architecture
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunit...
Aymen Baouab, Olivier Perrin, Nicolas Biri, Claude...