Sciweavers

2504 search results - page 63 / 501
» Enterprise Security Architecture
Sort
View
WETICE
2002
IEEE
15 years 4 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
GCC
2006
Springer
15 years 3 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
COLCOM
2008
IEEE
15 years 1 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
EDOC
2000
IEEE
15 years 4 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 3 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky