Sciweavers

1132 search results - page 122 / 227
» Application of Grid Security to Personal Distributed Environ...
Sort
View
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
14 years 1 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...
BLISS
2009
IEEE
13 years 9 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
CCGRID
2005
IEEE
14 years 1 months ago
Efficient resource description and high quality selection for virtual grids
Simple resource specification, resource selection, and effective binding are critical capabilities for Grid middleware. We the Virtual Grid, an abstraction for dynamic grid applic...
Yang-Suk Kee, D. Logothetis, Richard Y. Huang, Hen...