Sciweavers

328 search results - page 18 / 66
» Identity-Enriched Session Management
Sort
View
WIMOB
2007
IEEE
14 years 1 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
COMPSAC
2011
IEEE
12 years 7 months ago
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
—Providers of Web-based services can take advantage of many convenient features of cloud computing infrastructures, but they still have to implement request management algorithms...
Riccardo Lancellotti, Mauro Andreolini, Claudia Ca...
SIGMETRICS
2000
ACM
125views Hardware» more  SIGMETRICS 2000»
13 years 7 months ago
Resource management policies for e-commerce servers
Quality of service of e-commerce sites has been usually managed by the allocation of resources such as processors, disks, and network bandwidth, and by tracking conventional perfo...
Daniel A. Menascé, Rodrigo C. Fonseca, Virg...
IJNSEC
2010
120views more  IJNSEC 2010»
13 years 2 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
SERVICES
2010
129views more  SERVICES 2010»
13 years 9 months ago
Improving the Usability of HL7 Information Models by Automatic Filtering
Research Session 2 - Modeling and Abstraction of Services Session Chair: An Approach to Dynamic Provisioning of Social and Computational Services (SERVICES2010-4004) Luiz Olavo Bon...
Antonio Villegas, Antoni Olivé, Josep Vilal...