Sciweavers

764 search results - page 59 / 153
» An e-contracting reference architecture
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
CIB
2004
83views more  CIB 2004»
13 years 9 months ago
Web-Based Semantic Pervasive Computing Services
Abstract-- Pervasive Computing refers to a seamless and invisible computing environment which provides dynamic, proactive and context-aware services to the user by acquiring contex...
Yugyung Lee, Soon Ae Chun, James Geller
IAJIT
2010
133views more  IAJIT 2010»
13 years 8 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
JCIT
2010
111views more  JCIT 2010»
13 years 4 months ago
Shunt APF Based on Current Loop Repetitive Control
Three-phase shunt active power filter (APF) is often used to compensate the harmonic and reactive current derived from non-linear load. But many non-ideal factors, such as the lim...
Xueliang Wei
TDP
2010
189views more  TDP 2010»
13 years 4 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...