Sciweavers

42 search results - page 8 / 9
» Exploiting organisational information for service coordinati...
Sort
View
ISSRE
2010
IEEE
13 years 5 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
ACSAC
2000
IEEE
13 years 12 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
ATAL
2004
Springer
14 years 25 days ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
IPPS
2005
IEEE
14 years 1 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
INFOCOM
2010
IEEE
13 years 5 months ago
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
—We venture beyond the “listen-before-talk” strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary c...
Senhua Huang, Xin Liu, Zhi Ding