Sciweavers

819 search results - page 139 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
ATAL
2007
Springer
13 years 9 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
E4MAS
2006
Springer
13 years 11 months ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers
JUCS
2010
160views more  JUCS 2010»
13 years 5 months ago
LCP-Nets: A Linguistic Approach for Non-functional Preferences in a Semantic SOA Environment
Abstract: This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-f...
Pierre Châtel, Isis Truck, Jacques Malenfant
GCC
2009
Springer
13 years 5 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
WWW
2004
ACM
14 years 8 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl