Sciweavers

859 search results - page 96 / 172
» Security for Key Management Interfaces
Sort
View
HICSS
2000
IEEE
109views Biometrics» more  HICSS 2000»
14 years 2 months ago
Scalable and Secure Resource Location
In this paper we present Captain Cook, a service that continuously monitors resources in the Internet, and allows clients to locate resources using this information. Captain Cook ...
Robbert van Renesse
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 10 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
ESE
2006
256views Database» more  ESE 2006»
13 years 10 months ago
Integrating agile software development into stage-gate managed product development
Agile methods have evolved as a bottom-up approach to software development. However, as the software in embedded products is only one part of development projects, agile methods mu...
Daniel Karlström, Per Runeson
IJHPCA
2008
151views more  IJHPCA 2008»
13 years 10 months ago
WE-AMBLE: a Workflow Engine To Manage Awareness in Collaborative Grid Environments
Grid computing intends to share heterogeneous resources in dynamic service-based environments. This kind of systems has the major advantages of enabling rapid composition of distr...
Pilar Herrero, José Luis Bosque, Manuel Sal...
APNOMS
2008
Springer
14 years 15 hour ago
Towards Management Requirements of Future Internet
The Internet is one of the most successful modern technologies; we cannot imagine what our lives would be without the Internet. Despite the huge success of the Internet, many probl...
Sung-Su Kim, Mi-Jung Choi, Hong-Taek Ju, Masayoshi...