Sciweavers

78 search results - page 9 / 16
» Flexible Cryptographic Component Design for Secure Web Appli...
Sort
View
SIGOPSE
1996
ACM
15 years 1 months ago
The persistent relevance of the local operating system to global applications
The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software mainten...
Jay Lepreau, Bryan Ford, Mike Hibler
ISCC
2005
IEEE
15 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
ICC
2007
IEEE
15 years 3 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
76
Voted
BPM
2005
Springer
173views Business» more  BPM 2005»
15 years 3 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar
USS
2010
14 years 7 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp