Sciweavers

1040 search results - page 69 / 208
» Privacy for Telecom Services
Sort
View
CIKM
2009
Springer
14 years 3 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu
PAISI
2007
Springer
14 years 3 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
ACSAC
2000
IEEE
14 years 1 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
ETRICS
2006
14 years 26 days ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 11 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...