Sciweavers

4286 search results - page 849 / 858
» Formalizing Service Interactions
Sort
View
LISA
2008
13 years 9 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
ATAL
2008
Springer
13 years 9 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
DAIS
2007
13 years 8 months ago
Construction and Execution of Adaptable Applications Using an Aspect-Oriented and Model Driven Approach
Constructing and executing distributed applications that can adapt to their current operating context, in order to maintain or enhance Quality of Service (QoS) attribute levels, ar...
Sten A. Lundesgaard, Arnor Solberg, Jon Oldevik, R...
CSREAESA
2008
13 years 8 months ago
A Middleware for Model-Based Embedded Systems
To deal with the increasing complexity of embedded real-time systems the model-driven development approach has proven to be beneficial. The reduction of complexity achieved by the ...
Wolfgang Haberl, Jan Birke, Uwe Baumgarten