Sciweavers

2504 search results - page 52 / 501
» Enterprise Security Architecture
Sort
View
CAINE
2003
15 years 1 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
PRDC
2006
IEEE
15 years 5 months ago
Ontology based IT-security planning
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
Stefan Fenz, Edgar Weippl
OOPSLA
2004
Springer
15 years 5 months ago
RUBiS revisited: why J2EE benchmarking is hard
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
William Pugh, Jaime Spacco
GCC
2003
Springer
15 years 5 months ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
CAISE
2003
Springer
15 years 5 months ago
Implementing Virtual Enterprises Using AGORA Multi-agent System
Abstract. In this paper, we describe how the AGORA multi-agent architecture is used to support Virtual Enterprises(VE). Software agents represent the partners of a VE, who collabor...
Jinghai Rao, Sobah Abbas Petersen