Sciweavers

819 search results - page 116 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
COMCOM
2006
93views more  COMCOM 2006»
14 years 9 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 4 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
ICCS
2005
Springer
15 years 3 months ago
Java-Based Grid Service Spread and Implementation in Remote Sensing Applications
Remote sensing applications often concern very large volumes of spatio-temporal data, the emerging Grid computing technologies bring an effective solution to this problem. The Open...
Yanguang Wang, Yong Xue, Jianqin Wang, Chaolin Wu,...
SAC
2002
ACM
14 years 9 months ago
A multi-agent system architecture for coordination of just-in-time production and distribution
A multi-agent system architecture for coordination of just-in-time production and distribution is presented. The problem to solve is two-fold: first the right amount of resources ...
Paul Davidsson, Fredrik Wernstedt
SAC
2010
ACM
15 years 4 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...