Sciweavers

1863 search results - page 309 / 373
» Security Architecture for Web Services
Sort
View
JIT
2005
Springer
134views Database» more  JIT 2005»
14 years 3 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 9 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
DIM
2007
ACM
14 years 1 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
ATAL
2007
Springer
14 years 4 months ago
Learning consumer preferences using semantic similarity
In online, dynamic environments, the services requested by consumers may not be readily served by the providers. This requires the service consumers and providers to negotiate the...
Reyhan Aydogan, Pinar Yolum
OTM
2005
Springer
14 years 3 months ago
Registering a Business Collaboration Model in Multiple Business Environments
Today business registries are regarded as means of finding services offered by a business partner. However, business registries might also serve as means of seaching inter-organiza...
Birgit Hofreiter, Christian Huemer