Sciweavers

1795 search results - page 245 / 359
» Security Models and Information Flow
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 10 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
14 years 4 months ago
Barriers to Adoption of e-Government
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
Wm. Arthur Conklin
TES
2005
Springer
14 years 3 months ago
Systematic Design of Web Service Transactions
The development of composite Web services is still not as simple as the original vision indicated. Currently, the designer of a composite service needs to consider many different ...
Benjamin A. Schmit, Schahram Dustdar
MDM
2001
Springer
148views Communications» more  MDM 2001»
14 years 2 months ago
An Agent-Based Architecture Using XML for Mobile Federated Database Systems
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
Carlos Sánchez, Le Gruenwald
ISQED
2003
IEEE
85views Hardware» more  ISQED 2003»
14 years 3 months ago
Interoperability Beyond Design: Sharing Knowledge between Design and Manufacturing
The nature of IC design has is necessarily evolving to a more data-centric design flow in which EDA tools share a common information in a design database without the negative cost...
D. R. Cottrell, T. J. Grebinski