Sciweavers

328 search results - page 46 / 66
» On the Enactability of Business Protocols
Sort
View
CD
2004
Springer
14 years 3 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry
DRM
2004
Springer
14 years 3 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
XMLSEC
2003
ACM
14 years 3 months ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh
AUSAI
2003
Springer
14 years 3 months ago
An eNegotiation Framework
Negotiation between two trading agents is a two-stage process. First, the agents exchange offers whilst acquiring and exchanging information. Second, they attempt to reach a mutual...
John K. Debenham
COMPSAC
2002
IEEE
14 years 2 months ago
Case Study: Componentization of an Industrial Control System
When different business units of an international company are responsible for the development of different parts of a large system, a component-based software architecture may be ...
Frank Lüders, Ivica Crnkovic, Andreas Sjö...