Sciweavers

28 search results - page 4 / 6
» Single Sign-On in Service-Oriented Computing
Sort
View
IT
2008
159views more  IT 2008»
13 years 10 months ago
Service Oriented Architecture - Overview of Technologies and Standards
provides a powerful abstraction basically allowing to perceiving all compute resources as entities that can be dynamically discovered and composed. These entities are called servic...
Dimka Karastoyanova, Frank Leymann
PERCOM
2007
ACM
14 years 10 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
LADC
2007
Springer
14 years 4 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
ICSOC
2010
Springer
13 years 8 months ago
Efficient QoS-Aware Service Composition with a Probabilistic Service Selection Policy
Service-Oriented Architecture enables the composition of loosely coupled services provided with varying Quality of Service (QoS) levels. Given a composition, finding the set of ser...
Adrian Klein, Fuyuki Ishikawa, Shinichi Honiden
EWSA
2006
Springer
14 years 2 months ago
Modes for Software Architectures
Abstract. Modern systems are heterogeneous, geographically distributed and highly dynamic since the communication topology can vary and the components can, at any moment, connect t...
Dan Hirsch, Jeff Kramer, Jeff Magee, Sebasti&aacut...