Sciweavers

6137 search results - page 30 / 1228
» Securing Collaborative Applications
Sort
View
CDVE
2005
Springer
14 years 1 months ago
A Constraint Maintenance Strategy and Applications in Real-Time Collaborative Environments
A constraint expresses a relationship among one or more variables. Constraints are very useful in the development of collaborative applications, such as collaborative CAD and CASE ...
Kai Lin, David Chen, Chengzheng Sun, R. Geoff Drom...
ICWS
2009
IEEE
14 years 4 months ago
Building Collaboration Applications that Mix Web Services Hosted Content with P2P Protocols
The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. In this paper, ...
Ken Birman, Jared Cantwell, Daniel Freedman, Qi Hu...
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 9 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
IEEESCC
2007
IEEE
14 years 1 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
SIGCOMM
1998
ACM
13 years 11 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam