Sciweavers

1801 search results - page 159 / 361
» Implementation-Oriented Secure Architectures
Sort
View
MIDDLEWARE
2007
Springer
14 years 3 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
ISM
2006
IEEE
112views Multimedia» more  ISM 2006»
14 years 3 months ago
Security Considerations for SOA-Based Multimedia Applications
Growing levels of digitalization and broadband access drives extremely fast progress in multimedia and networking technologies and allows consumers to create requirements at an ac...
Andrew Roczniak, Alexandre Miège, Abdulmota...
STORAGESS
2005
ACM
14 years 3 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
ICICS
2005
Springer
14 years 3 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
ISW
2004
Springer
14 years 3 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...