Sciweavers

819 search results - page 122 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
ICAS
2005
IEEE
103views Robotics» more  ICAS 2005»
15 years 3 months ago
QoS issues in the Research and Academic Networks: The case of GRNET
This paper describes the design and the implementation of QoS services in a high speed backbone network as well as a management tool for the service. The services were designed ta...
Christos Bouras, Anastasios Karaliotas, Michael Oi...
NBIS
2007
Springer
15 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 4 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
SAC
2004
ACM
15 years 3 months ago
The eduSource Communication Language: implementing open network for learning repositories and services
Interoperability is one of the main issues in creating a networked system of repositories The approaches range from simply forcing one metadata standard on all participating repos...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
TKDE
2008
177views more  TKDE 2008»
14 years 9 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...