Results 311 to 320 of about 6,779,765 (359)
Some of the next articles are maybe not open access.

Secure Web Services with WS-Security

2004
Companies Have Not widely adopted Web services technology to this point because the technology has lacked a security specification that can ensure the integrity of transmitted messages and data. The WS-Security specification is a joint effort by Microsoft, IBM, and VeriSign to address this most important issue.
openaire   +2 more sources

Security Services and Cryptography

1999
The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: kryptos, which means hidden and logos, which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used
Mark Vandenwauver, Paul Ashley
openaire   +2 more sources

Security of Service Networks

2010
The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies ...
Dimitrakos T   +3 more
openaire   +3 more sources

Cloud Computing Security: A Survey of Service-based Models

Computers & security, 2021
Fatemeh Khoda Parast   +5 more
semanticscholar   +1 more source

Service Oriented Security

2007
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire   +1 more source

DPX: Data-Plane eXtensions for SDN Security Service Instantiation

International Conference on Detection of intrusions and malware, and vulnerability assessment, 2019
Taejune Park   +6 more
semanticscholar   +1 more source

EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security

International Conference on Fog and Edge Computing, 2017
Kewei Sha   +4 more
semanticscholar   +1 more source

A Face Recognition System Based on Local Binary Patterns and Support Vector Machine for Home Security Service Robot

International Symposium on Computational Intelligence and Design, 2016
Jiakailin Wang   +5 more
semanticscholar   +1 more source

A Security Service on-demand Architecture in SDN

Information and Communication Technology Convergence, 2016
Li-Der Chou   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy