Sciweavers

1254 search results - page 228 / 251
» Resource and Service Discovery in the iGrid Information Serv...
Sort
View
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 1 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 1 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
ACMICEC
2006
ACM
150views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
A framework for managing optimization models for supply chain software agents
As third party logistic services become popular, the role of software agents increases in importance in terms of the logistics scheduling of buyers and sellers. To support many mo...
Jae Kyu Lee, Yong Sik Chang
INFOCOM
2005
IEEE
14 years 28 days ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
MOBIQUITOUS
2005
IEEE
14 years 28 days ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang