Sciweavers

231 search results - page 21 / 47
» Modeling the User Acceptance of E-Mail
Sort
View
FASE
2007
Springer
14 years 27 days ago
Flexible and Extensible Notations for Modeling Languages
Abstract. In model-based development, a formal description of the software (the model) is the central artifact that drives other development activities. The availability of a model...
Jimin Gao, Mats Per Erik Heimdahl, Eric Van Wyk
WEBI
2004
Springer
14 years 2 days ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
ICICS
2009
Springer
14 years 1 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
PROVSEC
2009
Springer
14 years 1 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
ECUMN
2007
Springer
14 years 27 days ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...