Sciweavers

6844 search results - page 1073 / 1369
» Web Service Security
Sort
View
EDBT
2008
ACM
130views Database» more  EDBT 2008»
16 years 5 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
IEEECIT
2007
IEEE
15 years 11 months ago
The Value Gap Model: Value-Based Requirements Elicitation
The User requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep ...
Sang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In
AIME
2007
Springer
15 years 11 months ago
Healthcare Knowledge Management: The Art of the Possible
Abstract. Healthcare knowledge management is an active, yet not a well characterized research topic. In this chapter, we attempt to characterize healthcare knowledge management and...
Syed Sibte Raza Abidi
POLICY
2007
Springer
15 years 11 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
IPPS
2006
IEEE
15 years 11 months ago
A framework for developing distributed location based applications
Location based services and applications are buzzwords nowadays, yet they have been around for quite some time in a variety of applications. However these applications are scarce ...
Andrej Krevl, Mojca Ciglaric
« Prev « First page 1073 / 1369 Last » Next »