Sciweavers

611 search results - page 78 / 123
» Security Issues in Service Composition
Sort
View
IFIP
2003
Springer
15 years 5 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
WETICE
2007
IEEE
15 years 6 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi
STORAGESS
2005
ACM
15 years 5 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ECIS
2000
15 years 1 months ago
Electronic Notary System and its Certification Mechanism
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that cou...
Shinichi Nakahara
FTDCS
2004
IEEE
15 years 3 months ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...