Sciweavers

2005 search results - page 246 / 401
» Models and Meta Models for Transactions in Web Applications
Sort
View
101
Voted
DBSEC
2006
124views Database» more  DBSEC 2006»
15 years 3 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
ADAEUROPE
2004
Springer
15 years 7 months ago
PolyORB: A Schizophrenic Middleware to Build Versatile Reliable Distributed Applications
Abstract. The development of real-time distributed applications requires middleware providing both reliability and performance. Middleware must be adaptable to meet application req...
Thomas Vergnaud, Jérôme Hugues, Laure...
ISSRE
2003
IEEE
15 years 7 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
AAAI
2000
15 years 3 months ago
The TheaterLoc Virtual Application
Although much has been written about various information integration technologies, little has been said regarding how to combine these technologies together to build an entire &qu...
Greg Barish, Craig A. Knoblock, Yi-Shin Chen, Stev...
WWW
2003
ACM
16 years 2 months ago
Application specific data replication for edge services
The emerging edge services architecture promises to improve the availability and performance of web services by replicating servers at geographically distributed sites. A key chal...
Lei Gao, Michael Dahlin, Amol Nayate, Jiandan Zhen...