Sciweavers

1075 search results - page 73 / 215
» Access Control System Using Web Services for XML Messaging S...
Sort
View
INFOCOM
1999
IEEE
14 years 1 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
14 years 9 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
ICCSA
2010
Springer
14 years 3 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Choreography Model for IRS-III
This paper describes how we manage the interaction between different heterogeneous web services through choreographies within IRS-III. IRS-III is a framework and platform for deve...
John Domingue, Stefania Galizia, Liliana Cabral
TKDE
2008
177views more  TKDE 2008»
13 years 8 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...