Sciweavers

2517 search results - page 28 / 504
» Secure Deployment of Components
Sort
View
105
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Deployment automation with BLITZ
Minimizing the computing infrastructure (such as processors) in a distributed real-time embedded (DRE) system deployment helps reduce system size, weight, power consumption, and c...
Brian Dougherty, Jules White, Jaiganesh Balasubram...
SC
2005
ACM
15 years 8 months ago
GLARE: A Grid Activity Registration, Deployment and Provisioning Framework
Resource management is a key concern for implementing effective Grid middleware and shielding application developers from low level details. Existing resource managers concentrat...
Mumtaz Siddiqui, Alex Villazón, Jürgen...
135
Voted
CIMCA
2005
IEEE
15 years 8 months ago
Applying a Web-Service-Based Model to Dynamic Service-Deployment
Owing to the increase in both heterogeneity and complexity in today’s networking systems, the need arises for an architecture for network-based services that provides flexibilit...
Christos Chrysoulas, Evangelos Haleplidis, Robert ...
105
Voted
CSFW
1999
IEEE
15 years 6 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
121
Voted
CCS
2007
ACM
15 years 8 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...