Sciweavers

2517 search results - page 92 / 504
» Secure Deployment of Components
Sort
View
BXML
2004
15 years 4 months ago
Ontology-derived Activity Components for Composing Travel Web Services
: In this paper we present our ongoing work in creating a semantic Web service composition and execution framework. The efforts described are undertaken in the context of the SATIN...
Matthias Flügge, Diana Tourtchaninova
128
Voted
GPCE
2008
Springer
15 years 4 months ago
Property models: from incidental algorithms to reusable components
A user interface, such as a dialog, assists a user in synthesising a set of values, typically parameters for a command object. Code for “command parameter synthesis” is usuall...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...
156
Voted
ANSOFT
2002
159views more  ANSOFT 2002»
15 years 3 months ago
Using Component-Based Development and Web Technologies to Support a Distributed Data Management System
Over recent years, "Internet-able" applications have been used to support domains where distributed functionality is essential. This flexibility is also pertinent in situ...
M. Brian Blake, Gail Hamilton, Jeffrey Hoyt
134
Voted
EUROSEC
2010
ACM
15 years 8 months ago
The robustness of a new CAPTCHA
CAPTCHA is a standard security technology that presents tests to tell computers and humans apart. In this paper, we examine the security of a new CAPTCHA that was deployed until v...
Ahmad Salah El Ahmad, Jeff Yan, Lindsay Marshall
131
Voted
SAINT
2003
IEEE
15 years 8 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta