Sciweavers

861 search results - page 93 / 173
» Automated control of internet services
Sort
View
SWS
2004
ACM
15 years 9 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
QOFIS
2001
Springer
15 years 8 months ago
Traffic Handling in AQUILA QoS IP Network
The paper describes the traffic handling mechanisms implemented in the AQUILA pilot QoS IP network [10]. The AQUILA project enhances the DiffServ architecture concept [1,2,3] by ad...
A. Bak, Wojciech Burakowski, Fabio Ricciato, Stefa...
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 3 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
SWS
2004
ACM
15 years 9 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
MHCI
2004
Springer
15 years 9 months ago
A Prototype for Remote Vehicle Diagnostics
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...