9,947 Hits in 5.9 sec

Comparative Analysis of Business Object Approaches

2007 Informatică economică  
The specific technologies into consideration are: one focused on COM/DCOM/COM and Microsoft technologies, Internet Explorer and ActiveX - and the other focused on Netscape, CORBA, JAVA/J2EE solutions.  ...  By developing its own virtual java machine, Microsoft solved the problems of JAVA interpreter. .NET and J2EE are very similar, but Microsoft offers a more modern technical solution, by implementing web  ...  While COM and DCOM represents the low level of technology that allows components to interact, OLE, ActiveX and MTS represent the high level of the applications services which are built on the COM and DCOM  ... 
doaj:907c328c810948d19954d503104f1c08 fatcat:a3vtvvyrhfddzk72acz642jriq

A survey of commercial frameworks for the Internet of Things

Hasan Derhamy, Jens Eliasson, Jerker Delsing, Peter Priller
2015 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)  
In 2011 Ericsson and Cisco estimated 50 billion Internet connected devices by 2020, encouraged by this industry is developing application frameworks to scale the Internet of Things.  ...  The frameworks are evaluated against criteria such as architectural approach, industry support, standards based protocols and interoperability, security, hardware requirements, governance and support for  ...  ACKNOWLEDGEMENTS The Authors would like to thank AVL List GMBH for supporting this survey of commercial frameworks for the Internet of Things.  ... 
doi:10.1109/etfa.2015.7301661 dblp:conf/etfa/DerhamyEDP15 fatcat:esaatq44sjaklmzrccrfeq5fza

Web services: beyond the hype

S.J. Vaughan-Nichols
2002 Computer  
MICROSOFT'S .NET Microsoft's .NET is the most high profile and well developed of the WS initiatives.  ...  In general, said Scott Dietzen, BEA Systems' chief technology officer, public-key infrastructure and SSL will provide sufficient security.  ... 
doi:10.1109/2.982908 fatcat:o2nlvkwhv5djjh7ffm2c2lcvme

Internet developments and their significance for healthcare

J. S. Briggs, G. H. Early
1999 Medical informatics and the Internet in medicine (Print)  
The former comes with the web browser but provides secure transmission for other application-oriented Internet protocols by acting as a separate security layer between TCP and protocols such as HTTP, FTP  ...  employed for interconnecting networks and transmission media • Internet protocols -low level protocols such as TCP, IP and other related low level protocols Internet network infrastructure developments  ...  The Internet, at the Internet Protocol level, is connectionless though a service equivalent to that of a connection oriented network is provided by the TCP protocol.  ... 
doi:10.1080/146392399298357 pmid:10654809 fatcat:7x2zq4ci7jel7dt4yg77baexda

Interoperability In Component Based Software Development

M. Madiajagan, B. Vijayakumar
2008 Zenodo  
These components must be localized and identified in terms of available services and communication protocol before any request.  ...  styles that provide well-understood global design solutions.  ...  This level, firstly identified by Yellin and Strom, provides more powerful interoperability checks than those offered by the basic signature level.  ... 
doi:10.5281/zenodo.1074609 fatcat:bh75tcxgvzevxlm7emrk3ervse

Authentication and authorization infrastructures (AAIs): a comparative survey

Javier Lopez, Rolf Oppliger, Günther Pernul
2004 Computers & security  
This support can be provided, for example, by an authentication and authorization infrastructure (AAI).  ...  More specifically, we address Microsoft .NET Passport and some related activities (e.g. the Liberty Alliance Project), Kerberos-based solutions, and AAIs that are based on digital certificates and public  ...  Contrary to that, there is a lot of room for research and development to address the second point in an efficient and effective way.  ... 
doi:10.1016/j.cose.2004.06.013 fatcat:q3unwntl3jef7gpst7yij63qce

DotGrid: A .NET-based cross-platform Grid computing infrastructure

Ali Haj Abutalebi, Alireza Poshtkuhi, Leila Mahmoudi Ayough, Shaahin Hessabi
2006 2006 International Conference on Computing & Informatics  
Our DotGrid has been developed based on Microsoft .NET in Windows and MONO .NET in Linux and UNIX. Using DotGrid APIs, Grid middlewares and applications can be implemented easily.  ...  We evaluated DotGrid capabilities by implementing some applications including a high throughput file transfer and solving a typical computational problem.  ...  Transparent Proxy Mode provides high security and all Grid jobs are distributed among Grid nodes via DN.  ... 
doi:10.1109/icoci.2006.5276479 fatcat:t5nbdupg3bcbfke35c6qx5w3hm

Security for Broadband Internet Access Users [chapter]

James Trulove
2007 Information Security Management Handbook, Sixth Edition  
BROADBAND SECURITY RISKS Traditional remote access methods, by their very nature, provide a fair measure of link security.  ...  A great deal of security can be provided by masking internal addresses inside a NAT router.  ...  This will provide control over which applications and programs have access to Internet resources.  ... 
doi:10.1201/9781439833032.ch159 fatcat:zsm3nzw435bvrhsicwpvygbxu4

Rebirth of the computer industry

Harold W. Lawson
2002 Communications of the ACM  
High-level Web Services protocols such as Simple Object Access Protocol (SOAP) and Universal Description, Discovery, and Integration Protocol (UDDI), as well as related enterprise integration servers,  ...  After discounting much of the hype around .NET it is evident Microsoft plans to integrate around the Internet and has an ambitious plan to do so.  ... 
doi:10.1145/508448.508467 fatcat:ymoyhlwaqzfgffimpo6hsytpqq

A secure and expandable electronic patient record system using web-based technology

Roger Dzwonczyk, Michael Howie, Carlos del Río, Furrukh Khan, Luis Lopez, Sergio Bergese
2009 Ibnosina Journal of Medicine and Biomedical Sciences  
Web Services Enhancements (WSE) 2.0 for Microsoft .NET, an add-on to the Microsoft .NET Framework that implements Web service protocol specifications including WS-Security, WS-Trust, WS-Policy, and WS-SecureConversation  ...  We achieved our security goals by using Web Services Enhancements 2.0 (WSE 2.0) for Microsoft .NET, a supported add-on for Visual Studio .NET and the .NET Framework that gave us prebuilt support for evolving  ... 
doi:10.4103/1947-489x.211062 fatcat:xgc2tukbinbwhh2clwd3v5as7q

A Review on Cloud Computing Technologies and Security Issues

K. Padmaja, R. Seshadri
2016 Indian Journal of Science and Technology  
This study provides an overview of technologies, deployment models and issues of security present in the cloud computing industry.  ...  Figure 1 . 1 High level security architecture of cloud computing. Metering and Policy Management are the significant segments of Service Provider Layer.  ...  Figure 1 presents the high level outlook of security architecture of cloud computing, consists of four levels such as security authentication, data transmission security, virtual machine security and  ... 
doi:10.17485/ijst/2016/v9i45/105325 fatcat:377kyuzavnej3b65dbiiskpec4

DotGrid: a .NET-based cross-platform software for desktop grids

Alireza Poshtkohi, Ali Haj Abutalebi, Shaahin Hessabi
2007 International Journal of Web and Grid Services  
Using DotGrid services and APIs, grid desktop middleware and applications can be implemented conveniently. We evaluated our DotGrid's performance by implementing a set of grid-based applications.  ...  DotGrid is the first comprehensive desktop grid software utilising Microsoft's .NET Framework in Windows-based environments and MONO .NET in Unix-class operating systems to operate.  ...  MONO .NET in Linux and Microsoft .NET in Windows together provide a cross-platform .NET where a wide range of machines regardless of their OS may build up a grid.  ... 
doi:10.1504/ijwgs.2007.014955 fatcat:wzy46falcbevfarunavlzfegrm

Distributed component architectures security issues

Giorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis
2005 Computer Standards & Interfaces  
This paper examines the security threats those systems must confront and the solutions proposed by the major existing component architectures.  ...  A comparative evaluation of both security features and implementation issues is carried out to determine each architecture's strong points and drawbacks.  ...  Acknowledgments: The authors would like to thank Athanassios Vambakas (MSC Consultant) for his help and positive criticism on writing the .NET section.  ... 
doi:10.1016/j.csi.2004.08.003 fatcat:nh2y5dvwqzewhj3hv5enlrqchi

DotGrid: A .NET-based Infrastructure for Global Grid Computing

A. Poshtkuhi, A.H. Abutalebi, L.M. Ayough, S. Hessabi
2006 Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)  
Our DotGrid has been developed based on Microsoft .NET in Windows and MONO .NET in Linux and UNIX. Using DotGrid APIs, Grid middlewares and applications can be implemented easily.  ...  Recently, Grid infrastructures have provided wide integrated use of resources.  ...  DotSec protocol states a new Transport Security Layer architecture for reaching high throughput in data transfer in secure mode.  ... 
doi:10.1109/ccgrid.2006.1630951 fatcat:bgoac23lxrfophq643pknbiqby

e-Business Performance Issues, Quality Metrics and Development Frameworks

Vijaya ShettyS, H. Sarojadevi
2012 International Journal of Computer Applications  
e-Business systems have emerged as new powerful promising web service providers to perform business on the Internet. e-Business applications are complex to develop and deploy despite the availability of  ...  This research work also compares and contrasts the features of two popular development technologies; J2EE and Microsoft's .NET framework pertaining to e-Business application development.  ...  The purpose of security in e-Business is to meet the security expectations of users and providers.  ... 
doi:10.5120/8769-2694 fatcat:xydskdwmpjgkdl2pjkh7m74fhe
« Previous Showing results 1 — 15 out of 9,947 results