Sciweavers

578 search results - page 66 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
SEMWEB
2009
Springer
14 years 1 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
ICFCA
2005
Springer
14 years 2 months ago
Conceptual Exploration of Semantic Mirrors
Abstract. The “Semantic Mirrors Method” (Dyvik, 1998) is a means for automatic derivation of thesaurus entries from a word-aligned parallel corpus. The method is based on the c...
Uta Priss, L. John Old
MKWI
2008
153views Business» more  MKWI 2008»
13 years 10 months ago
A Reference Architecture for Semantic Business Process Management Systems
: Semantic Business Process Management (SBPM) enhances BPM with semantic technologies in order to increase the degree of automation in the BPM lifecycle and help in bridging the ga...
Dimka Karastoyanova, Tammo van Lessen, Frank Leyma...
ACSAC
2001
IEEE
14 years 15 days ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
ACISP
1998
Springer
14 years 1 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder