Sciweavers

47 search results - page 3 / 10
» Scalability and Flexibility in Authentication Services: The ...
Sort
View
EDO
2005
Springer
15 years 3 months ago
A flexible and extensible object middleware: CORBA and beyond
This paper presents a CORBA-compliant middleware architecture that is more flexible and extensible compared to standard CORBA. The portable design of this architecture is easily in...
Franz J. Hauck, Rüdiger Kapitza, Hans P. Reis...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 2 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
SACMAT
2005
ACM
15 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
155
Voted
ICDE
2009
IEEE
166views Database» more  ICDE 2009»
15 years 11 months ago
Supporting Database Applications as a Service
Abstract-- Multi-tenant data management is a form of Software as a Service (SaaS), whereby a third party service provider hosts databases as a service and provides its customers wi...
Mei Hui, Dawei Jiang, Guoliang Li, Yuan Zhou
ICCCN
1998
IEEE
15 years 1 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer