Sciweavers

299 search results - page 45 / 60
» Deniable Authentication on the Internet
Sort
View
ESWS
2004
Springer
13 years 11 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
HT
2009
ACM
13 years 11 months ago
Dynamic hypertext generation for reusing open corpus content
Adaptive hypermedia systems traditionally focus on providing personalised learning services for formal or informal learners. The learning material is typically sourced from a prop...
Ben Steichen, Séamus Lawless, Alexander O'C...
EPEW
2008
Springer
13 years 9 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
ICWS
2007
IEEE
13 years 9 months ago
Rich Services: The Integration Piece of the SOA Puzzle
One of the key challenges to successful systems-ofsystems integration using Web services technologies is how to address crosscutting architectural concerns such as policy manageme...
Matthew Arrott, Barry Demchak, Vina Ermagan, Claud...
ICWS
2007
IEEE
13 years 9 months ago
Reputation-Enhanced QoS-based Web Services Discovery
With an increasing number of Web services providing similar functionalities, Quality of Service (QoS) is becoming an important criterion for selection of the best available servic...
Ziqiang Xu, Patrick Martin, Wendy Powley, Farhana ...