Sciweavers

611 search results - page 82 / 123
» Security Issues in Service Composition
Sort
View
ICSE
2004
IEEE-ACM
15 years 12 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...
IEEESCC
2008
IEEE
15 years 6 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
GIS
2009
ACM
14 years 9 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...
ACSC
2010
IEEE
14 years 6 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
ICIP
2005
IEEE
15 years 5 months ago
Adaptive transcoding proxy architecture for video streaming in mobile networks
Wireless video streaming is an area of extensive research due to the error-prone nature of the radio channel with variations in throughput and delay. In mobile networks, handovers...
Matthias Dick, Jens Brandt, Verena Kahmann, Lars C...