Sciweavers

555 search results - page 93 / 111
» Anonymous Webs of Trust
Sort
View
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
14 years 5 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
COMPSAC
2008
IEEE
14 years 5 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
IEEEARES
2007
IEEE
14 years 5 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter
LISA
2001
14 years 8 days ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
ECIS
2000
14 years 8 days ago
IT-Enabled Sophistication Banking
- Globalization of financial markets resulting from both IT (particularly internet standards) and increasing homogeneity of regulation has strongly affected the environment, financ...
Hans Ulrich Buhl, Dennis Kundisch, Andreas Leinfel...