Sciweavers

2517 search results - page 5 / 504
» Secure Deployment of Components
Sort
View
126
Voted
FC
2003
Springer
125views Cryptology» more  FC 2003»
15 years 10 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
ICCS
2005
Springer
15 years 10 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
144
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 11 months ago
FRAME: An Innovative Incentive Scheme in Vehicular Networks
—Vehicular ad hoc networks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drive...
Feng Li, Jie Wu
143
Voted
CD
2004
Springer
15 years 10 months ago
Eureka - A Resource Discovery Service for Component Deployment
Abstract. Component orientation is a current trend for creating modern applications. The concept of a component is broad and includes plugins and other units of modularization. Typ...
Karl Pauls, Richard S. Hall
145
Voted
CBSE
2006
Springer
15 years 8 months ago
Defining and Checking Deployment Contracts for Software Components
Ideally in the deployment phase, components should be composable, and their composition checked. Current component models fall short of this ideal. Most models do not allow composi...
Kung-Kiu Lau, Vladyslav Ukis