Sciweavers

561 search results - page 22 / 113
» Remote Access Security Issues
Sort
View
JUCS
2010
114views more  JUCS 2010»
13 years 5 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
ISN
1995
Springer
14 years 2 months ago
Intelligent Remote Monitoring
Intelligent monitoring facilities are of paramount importance in both service and network management as they provide the capability to monitor quality of service and utilisation pa...
George Pavlou, Kevin M. T. McCarthy, George Mykoni...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 5 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
SBBD
2004
150views Database» more  SBBD 2004»
14 years 7 days ago
Active XML, Security and Access Control
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, T...
HPCN
1999
Springer
14 years 3 months ago
The Digital Puglia Project: An Active Digital Library of Remote Sensing Data
The growing need of software infrastructure able to create, maintain and ease the evolution of scientific data, promotes the development of digital libraries in order to provide th...
Giovanni Aloisio, Massimo Cafaro, Roy Williams