Sciweavers

84 search results - page 15 / 17
» Data Swapping: A Risk-Utility Framework and Web Service Impl...
Sort
View
ISADS
1999
IEEE
14 years 25 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
MIDDLEWARE
2004
Springer
14 years 1 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
JSS
2007
169views more  JSS 2007»
13 years 8 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
COMGEO
2010
ACM
13 years 12 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
WWW
2004
ACM
14 years 9 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl