Sciweavers

630 search results - page 54 / 126
» Acceptable internet use policy
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Using Type-of-Relationship (ToR) Graphs to Select Disjoint Paths in Overlay Networks
— Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid ro...
Sameer Qazi, Tim Moors
ICDCIT
2004
Springer
14 years 1 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
AAAI
1994
13 years 9 months ago
Using Knowledge Acquisition and Representation Tools to Support Scientific Communities
Widespread access to the Internet has led to the formation of geographically dispersed scientific communities collaborating through the network. The tools supporting such collabor...
Brian R. Gaines, Mildred L. G. Shaw
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
ECOWS
2011
Springer
12 years 7 months ago
Automating the Generation of Web Service Testbeds Using AOP
Abstract—One of the key concepts of service-oriented computing is dynamic binding which favors on-demand integration of services into a running system. Companies can outsource ta...
Lukasz Juszczyk, Schahram Dustdar