Sciweavers

1226 search results - page 155 / 246
» Service Oriented Security Architecture
Sort
View
EUROMICRO
2009
IEEE
15 years 1 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...
EGOV
2011
Springer
13 years 9 months ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...
FASE
2008
Springer
14 years 11 months ago
Verification of Architectural Refactorings by Rule Extraction
With the success of model-driven development as well as component-based and service-oriented systems, models of software architecture are key artefacts in the development process. ...
Dénes Bisztray, Reiko Heckel, Hartmut Ehrig
CCS
2008
ACM
14 years 12 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ICSOC
2004
Springer
15 years 3 months ago
Hot service deployment in an ad hoc grid environment
In this paper, we present a solution to the problem of dynamically deploying grid service factories onto computing nodes running an implementation of the Open Grid Services Infras...
Thomas Friese, Matthew Smith, Bernd Freisleben