The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...