Sciweavers

430 search results - page 80 / 86
» A System for Interactive Authorization for Business Processe...
Sort
View
SIGMOD
2007
ACM
178views Database» more  SIGMOD 2007»
14 years 7 months ago
Quality is in the eye of the beholder: towards user-centric web-databases
The proliferation of database-driven web sites (or web-databases) has brought upon a plethora of applications where both Quality of Service (QoS) and Quality of Data (QoD) are of ...
Huiming Qu, Jie Xu, Alexandros Labrinidis
OZCHI
2009
ACM
14 years 2 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
ATAL
2010
Springer
13 years 8 months ago
ALIVE: an agent-based framework for dynamic and robust service-oriented applications
Service-oriented systems are becoming more and more nodes in a digital, dynamic ecosystem requiring the identification and establishment of flexible, spontaneous collaboration act...
Javier Vázquez-Salceda, Wamberto Weber Vasc...
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
CHINZ
2007
ACM
13 years 11 months ago
Users dealing with spam and spam filters: some observations and recommendations
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...
Christopher Lueg, Sam Martin