Sciweavers

2560 search results - page 16 / 512
» Securing VO Management
Sort
View
GPC
2008
Springer
13 years 12 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
ISJGP
2007
146views more  ISJGP 2007»
13 years 10 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
13 years 11 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
ICMB
2005
IEEE
98views Business» more  ICMB 2005»
14 years 4 months ago
Security Issues in SIP Signaling in Wireless Networks and Services
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
Elthea T. Lakay, Johnson I. Agbinya