Sciweavers

590 search results - page 75 / 118
» Security Issues in VOIP Applications
Sort
View
ISI
2008
Springer
14 years 11 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
IEEEIAS
2009
IEEE
14 years 9 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
SAS
2009
Springer
147views Formal Methods» more  SAS 2009»
16 years 10 days ago
Polymorphic Fractional Capabilities
Abstract. The capability calculus is a framework for statically reasoning about program resources such as deallocatable memory regions. Fractional capabilities, originally proposed...
Hirotoshi Yasuoka, Tachio Terauchi
NPC
2005
Springer
15 years 5 months ago
Globus Toolkit Version 4: Software for Service-Oriented Systems
The Globus Toolkit (GT) has been developed since the late 1990s to support the development of service-oriented distributed computing applications and infrastructures. Core GT compo...
Ian T. Foster
IMCSIT
2010
14 years 9 months ago
The development features of the face recognition system
Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Rauf Sadykhov, Igor Frolov