Sciweavers

611 search results - page 77 / 123
» Security Issues in Service Composition
Sort
View
DEBU
2008
149views more  DEBU 2008»
14 years 12 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Interactive Multi-View Visual Contents Authoring System
This paper describes issues and consideration on authoring of interactive multi-view visual content based on MPEG-4. The issues include types of multi-view visual content; functio...
Injae Lee, Myungseok Ki, Seyoon Jeong, Kyuheon Kim
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 9 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
JTAER
2007
125views more  JTAER 2007»
14 years 11 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
CORR
2008
Springer
104views Education» more  CORR 2008»
14 years 12 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...