Sciweavers

2178 search results - page 66 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ATC
2007
Springer
14 years 3 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
ICALT
2005
IEEE
14 years 2 months ago
Towards an Advanced Modeling System Applying a Service-Based Approach
Based on the overall aims of the AdeLE (Adaptive e-Learning with Eye-Tracking) project, and in particular motivated by the decision of using a strictly separated system’s archit...
Christian Gütl, Victor Manuel García-B...
ICSOC
2007
Springer
14 years 3 months ago
Towards Self-management in Service-Oriented Computing with Modes
Abstract. A self-managed system is both self-assembling and selfhealing. Service-oriented Computing (SoC) architectures, such as a Web Services Architecture (WS-A) illustrate a hig...
Howard Foster, Sebastián Uchitel, Jeff Kram...
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 3 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
14 years 1 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt