Sciweavers

3420 search results - page 63 / 684
» A Language-Based Approach to Security
Sort
View
SAC
2008
ACM
13 years 9 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
FINTAL
2006
14 years 1 months ago
A Straightforward Method for Automatic Identification of Marginalized Languages
Spoken language identification consists in recognizing a language based on a sample of speech from an unknown speaker. The traditional approach for this task mainly considers the p...
Ana Lilia Reyes-Herrera, Luis Villaseñor Pi...
ACL
2010
13 years 8 months ago
Compositional Matrix-Space Models of Language
We propose CMSMs, a novel type of generic compositional models for syntactic and semantic aspects of natural language, based on matrix multiplication. We argue for the structural ...
Sebastian Rudolph, Eugenie Giesbrecht
PERCOM
2006
ACM
14 years 9 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
KES
2007
Springer
14 years 4 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu