Sciweavers

819 search results - page 100 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
PERVASIVE
2005
Springer
15 years 3 months ago
Context Modeling for Device- and Location-Aware Mobile Web Applications
Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and r...
Michael Hinz, Zoltán Fiala
RTSS
2002
IEEE
15 years 2 months ago
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data it...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
FGCS
2008
159views more  FGCS 2008»
14 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
JDCTA
2010
164views more  JDCTA 2010»
14 years 4 months ago
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing
With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There ...
Lu Lu, Xiuxia Quan
CCGRID
2003
IEEE
15 years 3 months ago
Multi-class Applications for Parallel Usage of a Guaranteed Rate and a Scavenger Service
— Grid computing requires network services beyond what is currently provided by the Best-Effort Internet. Among the different approaches towards network Quality of Service, aggre...
Markus Fidler, Volker Sander