Sciweavers

2442 search results - page 84 / 489
» Secure Service Orchestration
Sort
View
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 2 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
SAINT
2007
IEEE
14 years 2 months ago
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service
The Central Authentication Service (CAS) is a middleware for constructing a Single Sign On infrastructure for Web applications and has been developed by JA-SIG. In this paper, we ...
Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji...
PST
2004
13 years 9 months ago
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Ali Grami, Bernadette Schell
IEEEARES
2010
IEEE
14 years 3 months ago
Secure Monitoring of Service Level Agreements
—Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both ...
K. P. Clark, Martijn Warnier, Frances M. T. Brazie...
ICIW
2007
IEEE
14 years 2 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan