Sciweavers

63 search results - page 7 / 13
» Reasoning about Attribute Authenticity in a Web Environment
Sort
View
ISSA
2004
13 years 8 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
14 years 4 months ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon
WWW
2008
ACM
14 years 8 months ago
Non-intrusive monitoring and service adaptation for WS-BPEL
Web service processes currently lack monitoring and dynamic (runtime) adaptation mechanisms. In highly dynamic processes, services frequently need to be exchanged due to a variety...
Oliver Moser, Florian Rosenberg, Schahram Dustdar
IJMSO
2007
201views more  IJMSO 2007»
13 years 7 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
OAS
2003
13 years 8 months ago
Using OWL in a Pervasive Computing Broker
Computing is moving toward a pervasive context-aware environment in which agents with limited resources will require external support to help them become context-aware. In this pa...
Harry Chen, Timothy W. Finin, Anupam Joshi