Sciweavers

712 search results - page 141 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
MTA
2000
128views more  MTA 2000»
13 years 6 months ago
A CORBA Based QOS Support for Distributed Multimedia Applications
AdvanceobjectorientedcomputingplatformsuchastheCommonObjectRequestBrokerArchitecture (CORBA) provides a conducive and standardized framework for the development of distributed appl...
Hung Keng Pung, Wynne Hsu, Bhawani S. Sapkota, Law...
DIM
2006
ACM
14 years 20 days ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
WEBNET
2000
13 years 8 months ago
How the Wild Wide Web was Won: Online Web Developer Training
: As the Web grows in importance in institutional settings, so does the need for training. Universities are looking at the daunting task of putting more information and services on...
John Sharkey, Kitzzy Aviles, Barbara Ferguson
RAID
2007
Springer
14 years 24 days ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
EATIS
2007
ACM
13 years 10 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler