Sciweavers

1226 search results - page 215 / 246
» Service Oriented Security Architecture
Sort
View
CSI
2007
86views more  CSI 2007»
14 years 9 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray
SDMW
2009
Springer
15 years 2 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
MIDDLEWARE
2004
Springer
15 years 3 months ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
TRUST
2010
Springer
15 years 2 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
TSC
2010
133views more  TSC 2010»
14 years 8 months ago
Semantic-Based Mashup of Composite Applications
—The need for integration of all types of client and server applications that were not initially designed to interoperate is gaining popularity. One of the reasons for this popul...
Anne H. H. Ngu, Michael Pierre Carlson, Quan Z. Sh...