Sciweavers

2904 search results - page 121 / 581
» Internet Infrastructure Security
Sort
View
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 7 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
SRDS
2003
IEEE
15 years 6 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
146
Voted
PC
2002
189views Management» more  PC 2002»
15 years 1 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
INTERNET
2008
193views more  INTERNET 2008»
15 years 1 months ago
Deploying Rural Community Wireless Mesh Networks
The lack of adequate Internet provision in rural areas is widening the digital divide between town and country. This is proving detrimental to social communication as well as the a...
Johnathan Ishmael, Sara Bury, Dimitrios P. Pezaros...
IEEEARES
2007
IEEE
15 years 7 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter