Sciweavers

862 search results - page 120 / 173
» BISON: Providing Business Information Analysis as a Service
Sort
View
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 7 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 9 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
KBS
2007
76views more  KBS 2007»
13 years 7 months ago
What middleware for network centric operations?
The main intent of this paper is to address the issue of middleware in network centric operations. To this end, we characterize a set of Information Technology capabilities that s...
Ali Benssam, Jean Berger, Abdeslem Boukhtouta, Mou...
CLA
2007
13 years 9 months ago
Precalculating Component Interface Compatibility using FCA
In component-based software engineering, software systems are built by assembling prefabricated reusable components. The compatibility between the assembled components is crucial. ...
Gabriela Arévalo, Nicolas Desnos, Marianne ...
SEMWEB
2010
Springer
13 years 5 months ago
Using Semantics for Automating the Authentication of Web APIs
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...