Results 91 to 100 of about 629,332 (223)
As interações interorganizacionais importam significativamente para a eficiência das organizações e representam uma estratégia por meio da qual as micro e pequenas empresas (MPE) superam as suas limitações. Este artigo objetiva identificar os elementos
Cleber Carvalho de Castro +2 more
doaj
Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing [PDF]
Hadi Razzaghi Kouchaksaraei +1 more
openalex +1 more source
Moving among historical material and contemporary debates on xenophobia and war, this paper is an exploration of the self-representation “Italiani Brava Gente”, an image claiming the intrinsic goodness of the Italian people.
Paolo Favero
doaj
Developing web services in a computational grid environment [PDF]
Grid and Web services are both hot topics today. In this paper, we will present some ongoing work and planned future work at the Cambridge eScience Centre.
Hayes, M, Spivack, M, Usher, A, Yang, X
core
Securing Web Services Using XML Signature and XML Encryption [PDF]
R. A. K. Saravanaguru +3 more
openalex +1 more source
Trans-scleral Fixation of Posterior Chamber Intraocular Lens Combined with Vitreoretinal Surgery
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Amir Khosro Ghaseminejad, Hamid Ahmadieh
doaj
Effect of Horizontal Rectus Surgery on Clinical and Paraclinical Indices in Congenital Nystagmus
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Abbas Bagheri +3 more
doaj
“Clubs aren’t like that”: Discos, Deviance and Diegetics in Club Culture Cinema
This article considers ways in which filmmakers have attempted to address the subject of electronic dance music culture on the big screen. In what ways have directors tried to visually represent EDMC in fictional narratives?
Simon Andrew Morrison
doaj
<!--[if gte mso 9]><xml> Normal 0 false false false MicrosoftInternetExplorer4 </xml><![endif]--><!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <style> /* Style ...
Ingrid Kreissig
doaj
Cloud security and authentication vulnerabilities in SOAP protocol: addressing XML-based attacks
IntroductionThis research addresses the security weaknesses in SOAP-based web services, with a particular focus on authentication vulnerabilities resulting from XML-based attacks, such as Signature Wrapping or Replay Attacks. With an emphasis on the fact
Mozamel M. Saeed
doaj +1 more source

