Sciweavers

8503 search results - page 1352 / 1701
» Secure Software Architectures
Sort
View
114
Voted
ECIS
2001
15 years 5 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
134
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
15 years 3 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
DKE
2006
79views more  DKE 2006»
15 years 3 months ago
The view-based approach to dynamic inter-organizational workflow cooperation
This paper presents a novel approach to inter-organizational workflow cooperation. Our goal is to provide support for organizations which are involved in a shared but not pre-mode...
Issam Chebbi, Schahram Dustdar, Samir Tata
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 3 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
« Prev « First page 1352 / 1701 Last » Next »