Sciweavers

2517 search results - page 5 / 504
» Secure Deployment of Components
Sort
View
FC
2003
Springer
125views Cryptology» more  FC 2003»
14 years 23 days ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
ICCS
2005
Springer
14 years 1 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 2 months ago
FRAME: An Innovative Incentive Scheme in Vehicular Networks
—Vehicular ad hoc networks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drive...
Feng Li, Jie Wu
CD
2004
Springer
14 years 29 days ago
Eureka - A Resource Discovery Service for Component Deployment
Abstract. Component orientation is a current trend for creating modern applications. The concept of a component is broad and includes plugins and other units of modularization. Typ...
Karl Pauls, Richard S. Hall
CBSE
2006
Springer
13 years 11 months ago
Defining and Checking Deployment Contracts for Software Components
Ideally in the deployment phase, components should be composable, and their composition checked. Current component models fall short of this ideal. Most models do not allow composi...
Kung-Kiu Lau, Vladyslav Ukis