Sciweavers

1018 search results - page 119 / 204
» Remote User Authentication Using Public Information
Sort
View
WPES
2003
ACM
14 years 1 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao
DGO
2003
153views Education» more  DGO 2003»
13 years 9 months ago
Improving Access to Large Volumes of Online Data
The Internet has recently become the medium of interaction with large volumes of data. Enterprises in the public and private sectors made their databases available over the Intern...
Egemen Tanin, Hanan Samet
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 2 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
WEBI
2010
Springer
13 years 5 months ago
A Scalable Indexing Mechanism for Ontology-Based Information Integration
In recent years, there has been an explosion of publicly available RDF and OWL web pages. Some of these pages are static text files, while others are dynamically generated from la...
Yingjie Li, Abir Qasem, Jeff Heflin
AP2PC
2003
Springer
14 years 1 months ago
K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments
In this paper, we explore an architecture, called K-Trek, that enables mobile users to travel across knowledge distributed over large geographical areas (ranging from large public ...
Paolo Busetta, Paolo Bouquet, Giordano Adami, Matt...