Sciweavers

726 search results - page 75 / 146
» Securing XML data in third-party distribution systems
Sort
View
DIM
2009
ACM
14 years 2 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ICSE
2001
IEEE-ACM
14 years 8 days ago
TIGRA - An Architectural Style for Enterprise Application Integration
We report on experience that we made in the Trading room InteGRation Architecture project (TIGRA) at a large German bank. TIGRA developed a distributed system architecture for int...
Wolfgang Emmerich, Ernst Ellmer, Henry Fieglein
CCGRID
2005
IEEE
14 years 1 months ago
Using semantic Web technology to automate data integration in grid and Web service architectures
While the Grid and Web Services have helped us support heterogeneous resource access through the use of service oriented architectures, they have not addressed the issue of hetero...
Martin Szomszor, Terry R. Payne, Luc Moreau
AP2PC
2005
Springer
14 years 1 months ago
Highly Available DHTs: Keeping Data Consistency After Updates
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
Predrag Knezevic, Andreas Wombacher, Thomas Risse
ACSAC
2004
IEEE
13 years 11 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu