Sciweavers

819 search results - page 144 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
ECIS
2003
13 years 8 months ago
Internet enabled supply chain integration for SMEs
Electronic business has a strong influence on the relationships between partners within supply chains. Small and Medium Sized Enterprises (SMEs) need an affordable, integrated set...
Michal Zaremba, Brian Wall, Jim Browne, Szymon Zal...
ICAC
2005
IEEE
14 years 28 days ago
The Case for Automated Planning in Autonomic Computing
Computing systems have become so complex that the IT industry recognizes the necessity of deliberative methods to make these systems self-configuring, self-healing, selfoptimizin...
Biplav Srivastava, Subbarao Kambhampati
SGAI
2004
Springer
14 years 20 days ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau
SC
2004
ACM
14 years 23 days ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
SAC
2000
ACM
13 years 11 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...