Sciweavers

2187 search results - page 328 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
ESORICS
2009
Springer
14 years 4 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
ITNG
2008
IEEE
14 years 3 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
KCAP
2009
ACM
14 years 1 months ago
Cross ontology query answering on the semantic web: an initial evaluation
PowerAqua1 is a Question Answering system, which takes as input a natural language query and is able to return answers drawn from relevant semantic resources found anywhere on the...
Vanessa Lopez, Victoria S. Uren, Marta Sabou, Enri...
CCS
2004
ACM
14 years 2 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
14 years 2 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole