Search For:

Displaying 1-3 out of 3 total
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
Found in: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
By Partha Pal,Michael Atighetchi,Nathaniel Soule,Vatche Ishakian,Joseph Loyall,Robert Grant,Asher Sinclair
Issue Date:June 2014
pp. 141-149
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spi...
Extending Net-Centricity to Coalition Operations
Found in: IEEE Intelligent Systems
By Niranjan Suri,Andrzej Uszok,Rita Lenzi,Maggie Breedy,Jeffrey M. Bradshaw,Yat Fu,James Hanna,Vaughn T. Combs,Asher Sinclair,Robert Grant
Issue Date:January 2013
pp. 64-71
To bring the advantages of network-centric warfare to coalition warfighting, we must significantly improve our ability to quickly share critical information while still satisfying security requirements. Here, the authors explore a services-based approach t...
An End-to-End Security Auditing Approach for Service Oriented Architectures
Found in: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS)
By Mehdi Azarmi,Bharat Bhargava,Pelin Angin,Rohit Ranchal,Norman Ahmed,Asher Sinclair,Mark Linderman,Lotfi Ben Othmane
Issue Date:October 2012
pp. 279-284
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-...