Sciweavers

422 search results - page 57 / 85
» Risk management for distributed authorization
Sort
View
ICSOC
2007
Springer
15 years 6 months ago
Contextualized B2B Registries
Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and ...
Uwe Radetzki, Mike J. Boniface, Mike Surridge
82
Voted
SRDS
2003
IEEE
15 years 6 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
IJWIN
2008
126views more  IJWIN 2008»
15 years 19 days ago
IEEE 802.11 Load Balancing: An Approach for QoS Enhancement
Abstract. With the 802.11 WLAN multimedia applications (Video, Audio, realtime voice over IP,...) increasing, providing Quality of Service (QoS) support becomes very important sinc...
Issam Jabri, Nicolas Krommenacker, Thierry Divoux,...
100
Voted
CORR
2002
Springer
156views Education» more  CORR 2002»
15 years 14 days ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
INFSOF
2000
91views more  INFSOF 2000»
15 years 13 days ago
An operational approach to the design of workflow systems
We construct models as an aid to our thought process. A particular class of models, operational models, can be used for simulation and prototyping. The Opj modeling language is su...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano