Sciweavers

1863 search results - page 263 / 373
» Security Architecture for Web Services
Sort
View
PPPJ
2006
ACM
14 years 4 months ago
Mapping clouds of SOA- and business-related events for an enterprise cockpit in a Java-based environment
This paper is about business process management (BPM) and business activity monitoring (BAM) using event processing. We will show why the management of business processes is impor...
Daniel Jobst, Gerald Preissler
CONCURRENCY
2002
199views more  CONCURRENCY 2002»
13 years 9 months ago
Application portals: practice and experience
The implementation of multiple Grid computing portals has led us to develop a methodology for Grid portal development that facilitates rapid prototyping and building of portals. B...
Mary Thomas, Maytal Dahan, Kurt Mueller, Stephen M...
WWW
2008
ACM
14 years 10 months ago
Plurality: a context-aware personalized tagging system
We present the design of Plurality,1 an interactive tagging system. Plurality's modular architecture allows users to automatically generate high-quality tags over Web content...
Robert Graham, Brian Eoff, James Caverlee
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 3 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
14 years 4 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...