Sciweavers

764 search results - page 59 / 153
» An e-contracting reference architecture
Sort
View
JHSN
2006
267views more  JHSN 2006»
15 years 4 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
CIB
2004
83views more  CIB 2004»
15 years 4 months ago
Web-Based Semantic Pervasive Computing Services
Abstract-- Pervasive Computing refers to a seamless and invisible computing environment which provides dynamic, proactive and context-aware services to the user by acquiring contex...
Yugyung Lee, Soon Ae Chun, James Geller
IAJIT
2010
133views more  IAJIT 2010»
15 years 3 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
JCIT
2010
111views more  JCIT 2010»
14 years 11 months ago
Shunt APF Based on Current Loop Repetitive Control
Three-phase shunt active power filter (APF) is often used to compensate the harmonic and reactive current derived from non-linear load. But many non-ideal factors, such as the lim...
Xueliang Wei
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...