Sciweavers

3420 search results - page 63 / 684
» A Language-Based Approach to Security
Sort
View
110
Voted
SAC
2008
ACM
15 years 2 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
113
Voted
FINTAL
2006
15 years 6 months ago
A Straightforward Method for Automatic Identification of Marginalized Languages
Spoken language identification consists in recognizing a language based on a sample of speech from an unknown speaker. The traditional approach for this task mainly considers the p...
Ana Lilia Reyes-Herrera, Luis Villaseñor Pi...
119
Voted
ACL
2010
15 years 24 days ago
Compositional Matrix-Space Models of Language
We propose CMSMs, a novel type of generic compositional models for syntactic and semantic aspects of natural language, based on matrix multiplication. We argue for the structural ...
Sebastian Rudolph, Eugenie Giesbrecht
134
Voted
PERCOM
2006
ACM
16 years 2 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
132
Voted
KES
2007
Springer
15 years 9 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu