Sciweavers

422 search results - page 33 / 85
» Risk management for distributed authorization
Sort
View
63
Voted
GCC
2003
Springer
15 years 5 months ago
Research on Construction of EAI-Oriented Web Service Architecture
Web service based data exchange has been the trend of EAI. We can create Proxies to expose existing systems as web services. There have been some tools that can help users to const...
Xin Peng, Wenyun Zhao, En Ye
ICDCSW
2002
IEEE
15 years 5 months ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...
ECOOP
2008
Springer
15 years 2 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
STORAGESS
2005
ACM
15 years 6 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
93
Voted
ECIS
2000
15 years 1 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...