2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Security Middleware
 
Intel Common Data Security Architecture (CDSA)
http://developer.intel.com/ial/security/
Industry's First Security Middleware Product, SmartGATE
http://www.rsasecurity.com/news/pr/960117-2.html
Network Security Middleware
http://istpub.berkeley.edu:4201/bcc/Apr_May99/sec.middle.html
Security Middleware
http://www.geobridge.net/products/middleware.jsp
ESec's Igloo Electronic Commerce Framework (Middleware)
http://www.igloo.esec.com.au/
http://www.esec.com.au/ecm.html
Adiron Security Middleware Toolkit Products
http://www.adiron.com/products.html
Global Privacy Solutions
http://www.privacysolutions.com/
OpenSSL's Open Source Toolkits for SSL/TLS
http://www.openssl.org/
PGP Security Infrastructure Sigma Project
http://www.pgp.com/research/nailabs/distributed/sigma.asp
PGP Security Infrastructure Secure Virtual Enclaves (SVE) Project
http://www.pgp.com/research/nailabs/distributed/sve-project.asp
Kyberpass Enterprise TrustPlatform
http://www.kyberpass.com/products/enterprise/index.html
E-Security for E-Business
http://www.kyberpass.com/corporate/registration/e-security.html
Verifiable Identifiers in Middleware Security
http://www.acsac.org/2001/abstracts/fri-1030-a-lang.html
Security Requirements for Message-Oriented Middleware
http://www.eaijournal.com/PDF/MomSecure.pdf
Multilateral Security in Middleware Based Telecommunication Architectures
http://citeseer.nj.nec.com/102977.html
Messaging Middleware Security
http://www.nwfusion.com/ecomm2001/review/review_security.html
Issues in Smartcard Middleware
http://www-sop.inria.fr/oasis/JCW/KEHR.pdf
Accelerating Security Policies Thru Middleware
http://www.kyberpass.com/news/media/news_pdfs/news03_13_02.pdf
RSA BSAFE Crypto-J: Cryptographic Components for Java
http://crypto.radiusnet.net/archive/b-safe/cryptoj_ds.pdf
Crypto API
http://vega.icu.ac.kr/~kkj/mil-capi.html
Microsoft Crypto API Project Report
http://www.ieee-security.org/Cipher/Newsbriefs/1996/960214.MSCAPI.html
Using Microsoft Crypto API
http://www.rgagnon.com/pbdetails/pb-0170.html
How To Install the Microsoft Crypto API
http://service2.symantec.com/SUPPORT/pca.nsf/docid/1997121010943
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.