Sciweavers

627 search results - page 55 / 126
» Collaborative data privacy for the web
Sort
View
IJEIS
2010
113views more  IJEIS 2010»
13 years 5 months ago
A Good Role Model for Ontologies: Collaborations
Abstract. Ontologies are today used to annotate web data with machine processable semantics and for domain modeling. As the use of ontologies increases and the ontologies themselve...
Michael Pradel, Jakob Henriksson, Uwe Aßmann
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
13 years 11 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
ISI
2006
Springer
13 years 8 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ISSA
2004
13 years 9 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
DBISP2P
2005
Springer
183views Database» more  DBISP2P 2005»
14 years 1 months ago
Database Selection and Result Merging in P2P Web Search
Intelligent Web search engines are extremely popular now. Currently, only commercial centralized search engines like Google can process terabytes of Web data. Alternative search en...
Sergey Chernov, Pavel Serdyukov, Matthias Bender, ...