Sciweavers

3257 search results - page 597 / 652
» networking 2004
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICWS
2004
IEEE
14 years 11 months ago
Net Traveler: A Framework for Autonomic Web Services Collaboration, Orchestration and Choreography in E-Government Information S
Next-generation Government Information Systems will integrate large amounts of heterogeneous data sources located on distributed networks like the Internet. We present Net Travele...
Hillary Caituiro-Monge, Manuel Rodriguez-Martinez
ICWS
2004
IEEE
14 years 11 months ago
Triana: A Graphical Web Service Composition and Execution Toolkit
Service composition refers to the aggregation of services to build complex applications to achieve client requirements. It is an important challenge to make it possible for users ...
Shalil Majithia, Matthew S. Shields, Ian J. Taylor...
IIWAS
2004
14 years 11 months ago
Client and Server Mobility for WEB Applications
: As mobile devices and broadband networks are widely available, it is desirable to provide mobility for web services. A web service is mobile in the sense that, without interrupti...
Yi-Hua Tsai, Jian-Jia Chen, Tei-Wei Kuo, Chi-Sheng...
ISSA
2004
14 years 11 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche