Sciweavers

2442 search results - page 44 / 489
» Secure Service Orchestration
Sort
View
SIGCOMM
2010
ACM
13 years 8 months ago
No more middlebox: integrate processing into network
Traditionally, in-network services like firewall, proxy, cache, and transcoders have been provided by dedicated hardware middleboxes. A recent trend has been to remove the middleb...
Jeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Suj...
PET
2012
Springer
11 years 10 months ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
AICT
2006
IEEE
120views Communications» more  AICT 2006»
14 years 2 months ago
Business Processes Characterisation Through Definition of Structural and Non-Structural Criteria
Workflow and Web Services have the main role in the development and in the realisation of B2B architectures. In this context, the principal target is to compose many services supp...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
ICWS
2008
IEEE
13 years 9 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart
IEEEARES
2007
IEEE
14 years 2 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer