Sciweavers

497 search results - page 55 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
OTM
2007
Springer
15 years 10 months ago
Top-Down Modeling Methodology for Model-Driven SOA Construction
Service Oriented Architecture (SOA) has been developed to enhance the integration of various systems to allow organizations to be more flexible in case of business changes. This pa...
Jan Ricken
ECIR
2009
Springer
15 years 2 months ago
Revisiting IR Techniques for Collaborative Search Strategies
Abstract. This paper revisits some of the established Information Retrieval (IR) techniques to investigate effective collaborative search strategies. We devised eight search strate...
Hideo Joho, David Hannah, Joemon M. Jose
EDBT
2009
ACM
90views Database» more  EDBT 2009»
15 years 11 months ago
Privacy-preserving data mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers ...
Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patr...
IEEEARES
2006
IEEE
15 years 10 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
IEEEARES
2010
IEEE
15 years 9 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...