Sciweavers

8493 search results - page 1620 / 1699
» Implementing a distributed firewall
Sort
View
DRM
2003
Springer
14 years 3 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
EAGC
2003
Springer
14 years 3 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
14 years 3 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
GCC
2003
Springer
14 years 3 months ago
Dynamic Data Grid Replication Strategy Based on Internet Hierarchy
Abstract. In data grid, large quantity of data files is produced and data replication is applied to reduce data access time. Efficiently utilizing grid resources becomes important ...
Sang-Min Park, Jai-Hoon Kim, Young-Bae Ko, Won-Sik...
GCC
2003
Springer
14 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
« Prev « First page 1620 / 1699 Last » Next »