Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
The dependability of composite services is largely affected by their constituent Web services. Composite services have to operate in an open and dynamically changing environment i...
Domenico Bianculli, Walter Binder, Mauro Luigi Dra...
Abstract. The research project CASCOM (Context-aware Business Application Service Co-ordination in Mobile Computing Environments) will implement, validate, and trial value-added su...
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...