Web-based applications with a large variety of users suffer from the inability to satisfy heterogeneous needs. A remedy for the negative effects of the traditional "one-size-...
Paolo Buono, Maria Francesca Costabile, Stefano Gu...
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
— Most information and services required today by designers will soon become available as documents distributed in a wide area hypermedia network. New integration services are re...
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
: Grid computing infrastructures and service-oriented architectures commonly rely on web services as their implementation technology. This technology allows complex workflows to be...