Sciweavers

2259 search results - page 341 / 452
» Addressing Mode Selection
Sort
View
DIM
2008
ACM
13 years 11 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
DIM
2008
ACM
13 years 11 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
EDBT
2008
ACM
136views Database» more  EDBT 2008»
13 years 11 months ago
Dealing with P2P semantic heterogeneity through query expansion and interpretation
In P2P systems where query initiators and information providers do not necessarily share the same ontology, semantic interoperability generally relies on ontology matching or sche...
Anthony Ventresque, Sylvie Cazalens, Philippe Lama...
ER
2008
Springer
110views Database» more  ER 2008»
13 years 11 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
EUROPAR
2008
Springer
13 years 11 months ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...