Sciweavers

240 search results - page 36 / 48
» Privacy and Utility in Business Processes
Sort
View
OOPSLA
2000
Springer
14 years 2 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
EUROPKI
2009
Springer
13 years 8 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
ACSW
2006
14 years 11 days ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
OOPSLA
2009
Springer
14 years 5 months ago
Enhancing source-level programming tools with an awareness of transparent program transformations
Programs written in managed languages are compiled to a platform-independent intermediate representation, such as Java bytecode. The relative high level of Java bytecode has engen...
Myoungkyu Song, Eli Tilevich
SOCA
2010
IEEE
13 years 8 months ago
Service-oriented data quality engineering and data publishing in the cloud
Traditional data quality engineering techniques, often used and deployed within a single enterprise environment, are inadequate to cope with the rapid change of data, with a multit...
Marco Comerio, Hong Linh Truong, Carlo Batini, Sch...