Sciweavers

2178 search results - page 192 / 436
» Toward Systemically Secure IT Architectures
Sort
View
127
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
VRML
2009
ACM
15 years 10 months ago
Interactive stories on the net: a model and an architecture for X3D worlds
This work discusses a model and an architecture for interactive stories to be displayed on the net, designed for being independent from the specific story represented and suitabl...
Efrem Carnielli, Fabio Pittarello
137
Voted
EUROPAR
2008
Springer
15 years 5 months ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
180
Voted
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 7 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICDIM
2006
IEEE
15 years 9 months ago
Exposing Web Services to Business Partners: Security and Quality of Service Issue
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...