Sciweavers

1863 search results - page 255 / 373
» Security Architecture for Web Services
Sort
View
JNW
2006
142views more  JNW 2006»
13 years 10 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
JSS
2007
169views more  JSS 2007»
13 years 10 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
ICDE
2007
IEEE
137views Database» more  ICDE 2007»
14 years 11 months ago
PASS Middleware for Distributed and Autonomous XML Message Processing
Basic message processing tasks, such as wellformedness checking and grammar validation, can be off-loaded from the service providers' own infrastructures. To enable effective...
Dirceu Cavendish, K. Selçuk Candan
AGENTS
2000
Springer
14 years 2 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
SOSP
2005
ACM
14 years 7 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh