Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Paula Austel"'
Autor:
Thomas Mikalsen, Upendra Sharma, Paula Austel, Ignacio Silva-Lepe, Isabelle Rouvellou, Revathi Subramanian, Han Chen
Publikováno v:
BigSystem@HPDC
To help drive top line growth of their businesses, the development and IT organizations are under increasing pressure to create and deliver applications at ever faster paces. The advent of Cloud Computing has not only lowered the cost of IT operation
Autor:
Isabelle Rouvellou, Upendra Sharma, Ignacio Silva-Lepe, Parijat Dube, Revathi Subramanian, Han Chen, Paula Austel, Yandong Wang, Wei Tan, Thomas Mikalsen
Publikováno v:
Conf. Computing Frontiers
In their pursuit of market competitiveness and sustainable top line growth, enterprises are increasingly turning to sophisticated analytics solutions to derive insights and value from the deluge of data that are being generated from all sources. Lead
Publikováno v:
IBM Systems Journal. 44:847-867
Business-driven development and management of secure applications and solutions is emerging as a key requirement in the realization of an on demand enterprise. In a given enterprise, individuals acting in various roles contribute to the modeling, dev
Publikováno v:
Service-Oriented Computing – ICSOC 2007 ISBN: 9783540749738
ICSOC/ServiceWave
ICSOC/ServiceWave
Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterprise environments, mashups are recently used for implementing Web-based business pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::649762f957112a36a110c4e08c799563
https://doi.org/10.1007/978-3-642-10383-4_28
https://doi.org/10.1007/978-3-642-10383-4_28
Publikováno v:
ICWS
The myriad of SOA platforms and the complexity of the Web services standards has meant that it is difficult for users to ensure that their deployments are appropriately secure. Despite the compilation of various SOA security "best practices''', detec
Autor:
Paula Austel, Michael McIntosh
Publikováno v:
SWS
Naive use of XML Signature may result in signed documents remaining vulnerable to undetected modification by an adversary. In the typical usage of XML Signature to protect SOAP messages, an adversary may be capable of modifying valid messages in orde