Sciweavers

534 search results - page 52 / 107
» Research on an MOM-Based Service Flow Management System
Sort
View
CCS
2008
ACM
15 years 1 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 6 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 6 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
ISCC
2003
IEEE
135views Communications» more  ISCC 2003»
15 years 5 months ago
High Performance Routing in a LEO Satellite Network
Satellite systems are designed as a backup system to the existing land based wireless systems. Because of the global coverage of the system it becomes more economic for the rural ...
Roy Kucukates, Cem Ersoy