Sciweavers

700 search results - page 102 / 140
» Enterprise Computing
Sort
View
EUC
2007
Springer
14 years 4 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
GECON
2007
Springer
126views Business» more  GECON 2007»
14 years 4 months ago
GridEcon - The Economic-Enhanced Next-Generation Internet
The major shortcoming of Grid middleware systems is the lack of economic-enhanced Grid services. These new services are necessary in order to let Grid users benefit from the proper...
Jörn Altmann, Costas Courcoubetis, John Darli...
PAM
2007
Springer
14 years 4 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
IEEESCC
2006
IEEE
14 years 3 months ago
Applying Distributed Business Rules - The VIDRE Approach
Today’s business processes are not static, they need to be adapted frequently to reflect changing business requirements. Several business process languages such as WS-BPEL have...
Florian Rosenberg, Christoph Nagl, Schahram Dustda...
CONEXT
2006
ACM
14 years 3 months ago
SMARTA: a self-managing architecture for thin access points
Optimally choosing operating parameters for access points in an enterprise wireless LAN environment is a difficult and well-studied problem. Unlike past work, the SMARTA self-man...
Nabeel Ahmed, Srinivasan Keshav