Sciweavers

640 search results - page 121 / 128
» Foundations of Web Transactions
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
CSREASAM
2008
13 years 9 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
IADIS
2004
13 years 9 months ago
The Intercollege Student Intranet
In this paper we present the Intercollege Intranet, which has been developed within the strategic aims of the College to offer better services to students and faculty and to enhan...
Philippos Pouyioutas, Maria Poveda, George Soleas,...
DKE
2008
109views more  DKE 2008»
13 years 7 months ago
Deterministic algorithms for sampling count data
Processing and extracting meaningful knowledge from count data is an important problem in data mining. The volume of data is increasing dramatically as the data is generated by da...
Hüseyin Akcan, Alex Astashyn, Hervé Br...
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...