Sciweavers

2234 search results - page 326 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 8 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
SIGMOD
2005
ACM
156views Database» more  SIGMOD 2005»
16 years 1 months ago
Model-driven design of service-enabled web applications
Significant efforts are currently invested in application integration to enable the interaction and composition of business processes of different companies, yielding complex, mul...
Marco Brambilla, Stefano Ceri, Piero Fraternali, R...
ICDE
2010
IEEE
202views Database» more  ICDE 2010»
16 years 1 months ago
Generating code for holistic query evaluation
We present the application of customized code generation to database query evaluation. The idea is to use a collection of highly efficient code templates and dynamically instantiat...
Konstantinos Krikellas, Marcelo Cintra, Stratis Vi...
IEEEARES
2010
IEEE
15 years 5 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
15 years 6 months ago
XML-Based Supply Chain Management--As SIMPLEX as It Is
In this paper we want to examine, to what extent XML is able to support the exchange of business documents in supply chains. Thereby we focus on the problem of converting differen...
Peter Buxmann, Luis Martín Díaz, Eri...