Sciweavers

426 search results - page 46 / 86
» Web services security configuration in a service-oriented ar...
Sort
View
AEI
2010
148views more  AEI 2010»
13 years 9 months ago
Modeling and monitoring of construction supply chains
The planning and management of supply chains require properly specifying the participating members and the relationships among them. Construction supply chains usually consist of n...
Jack C. P. Cheng, Kincho H. Law, Hans Bjornsson, A...
CCS
2008
ACM
13 years 10 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
SEAA
2008
IEEE
14 years 3 months ago
GRAIL - A Tool for Accessing and Instrumenting WSRF - compliant Web Services
Grid access methods are still dominated by command line tools or manually developed, problem specific graphical user interfaces. This fact reduces the acceptance of the Grid for ...
Thomas Jejkal, Rainer Stotzka, Michael Sutter
DGO
2010
189views Education» more  DGO 2010»
13 years 10 months ago
Three-layered QoS for eGovernment web services
An applied research for the incremental evolution of a service oriented architecture for local eGovernment portals has been developed. Our reference eGovernment environment, curre...
Antonio Candiello, Andrea Albarelli, Agostino Cort...
ICWS
2009
IEEE
14 years 6 months ago
A Policy-Based Middleware for Web Services SLA Negotiation
Negotiation of Service Level Agreements (SLAs) is very important for maintaining Quality of Service (QoS) of composite Web services-based business processes. The process of negoti...
Farhana H. Zulkernine, Patrick Martin, Chris Cradd...