Sciweavers

1403 search results - page 128 / 281
» Security Model for XML Data
Sort
View
WSC
2000
13 years 11 months ago
Finding a substrate for federated components on the web
Recent developments in software component technology have renewed the promise of reusable software. Combining this with the possibilities of sharing simulation results and models ...
John A. Miller, Andrew F. Seila, Junxiu Tao
JTAER
2008
175views more  JTAER 2008»
13 years 10 months ago
A Core Component-based Modelling Approach for Achieving e-Business Semantics Interoperability
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
JUCS
2006
94views more  JUCS 2006»
13 years 10 months ago
UML-Based Modeling of Data-oriented WEB Applications
Abstract: Recently a growing demand has arisen for methods for the development of smalland medium scale Web Information Systems (WIS). Web applications are being built in a rapidly...
Attila Adamkó
SERVICES
2010
201views more  SERVICES 2010»
13 years 5 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
ACSC
2007
IEEE
14 years 2 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...