Sciweavers

819 search results - page 128 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
RAID
2005
Springer
15 years 3 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
WORDS
2003
IEEE
15 years 3 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
IEEESCC
2010
IEEE
14 years 7 months ago
BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications
Service-orientation and object-oriented design are common practice in the field of business application development. Business process execution languages help to facilitate the orc...
Marvin Ferber, Thomas Rauber, Sascha Hunold
COMGEO
1999
ACM
14 years 9 months ago
Visualizing geometric algorithms over the Web
The visual nature of geometry applications makes them a natural area where visualization can be an effective tool for demonstrating algorithms. In this paper we propose a new mode...
James E. Baker, Isabel F. Cruz, Giuseppe Liotta, R...
HOTNETS
2010
14 years 4 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica