Results 301 to 310 of about 2,383,360 (354)
Some of the next articles are maybe not open access.
Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
J. Al-Muhtadi, D. Mickunas, R. Campbell
openaire +1 more source
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
J. Al-Muhtadi, D. Mickunas, R. Campbell
openaire +1 more source
2002
Summary: Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define a common standard, and solutions like SOAP and XML-RPC are already used in a few situations, demonstrating the potential.
E. Damiani +3 more
openaire +2 more sources
Summary: Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define a common standard, and solutions like SOAP and XML-RPC are already used in a few situations, demonstrating the potential.
E. Damiani +3 more
openaire +2 more sources
2010
This chapter surveys the context for web services security and discusses the issues and standards at every level of architectural. The authors attempt to evaluate the status of industrial practice with respect to the security of web services. They look at commercial products and their supporting levels, and end with some conclusions. They see a problem
Fernandez, Eduardo B. +4 more
openaire +2 more sources
This chapter surveys the context for web services security and discusses the issues and standards at every level of architectural. The authors attempt to evaluate the status of industrial practice with respect to the security of web services. They look at commercial products and their supporting levels, and end with some conclusions. They see a problem
Fernandez, Eduardo B. +4 more
openaire +2 more sources
2006
During the past few years, significant standardization work in the Web services (WS) technology area has been performed. As a consequence of these initial efforts, WS foundational stable specifications have already been delivered. Now, it is time for the industry to standardize and address the security issues that have emerged from this paradigm.
Carlos A.G. Garcia +2 more
openaire +1 more source
During the past few years, significant standardization work in the Web services (WS) technology area has been performed. As a consequence of these initial efforts, WS foundational stable specifications have already been delivered. Now, it is time for the industry to standardize and address the security issues that have emerged from this paradigm.
Carlos A.G. Garcia +2 more
openaire +1 more source
2007
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire +1 more source
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire +1 more source
Information Systems Security, 2001
Abstract As I predicted earlier this year, this has been a difficult time for all the start-ups in the information security business. With the economy struggling along, there have been many layoffs and hiring freezes within our industry. I was recently talking to a recruiter who had called me.
openaire +1 more source
Abstract As I predicted earlier this year, this has been a difficult time for all the start-ups in the information security business. With the economy struggling along, there have been many layoffs and hiring freezes within our industry. I was recently talking to a recruiter who had called me.
openaire +1 more source
2019
<div class="section abstract"> <div class="htmlview paragraph">The scope of this SAE Recommended Practice is to require the use of the same Security Services as defined by the International Standard ISO/CD 15764, modified by the Class of Security as determined by the resource provider and referenced in <span class="xref">Table 1</
openaire +1 more source
<div class="section abstract"> <div class="htmlview paragraph">The scope of this SAE Recommended Practice is to require the use of the same Security Services as defined by the International Standard ISO/CD 15764, modified by the Class of Security as determined by the resource provider and referenced in <span class="xref">Table 1</
openaire +1 more source
2014
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Jamie Kurtz, Brian Wortman
openaire +1 more source
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Jamie Kurtz, Brian Wortman
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly

