Sciweavers

2442 search results - page 349 / 489
» Secure Service Orchestration
Sort
View
LISA
2001
14 years 11 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
ULPAA
1994
120views Hardware» more  ULPAA 1994»
14 years 11 months ago
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
A uniform extension language for email systems can radically extend the utility of electronic mail, simplifying the construction of mail-based services and permitting the delivery...
Nathaniel S. Borenstein
JSS
2006
65views more  JSS 2006»
14 years 10 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
PAAMS
2010
Springer
14 years 8 months ago
Agents to Help Context-Aware System in Home Care
Context-aware systems capture information from the attributes located within their surroundings and deal with different ways of interacting with the user in its environment. This p...
Juan A. Fraile, Dante I. Tapia, Jesús A. Ro...
BNCOD
2009
125views Database» more  BNCOD 2009»
14 years 7 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...