Sciweavers

1116 search results - page 8 / 224
» Secure Mediation: Requirements and Design
Sort
View
CCS
2006
ACM
14 years 24 days ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...
DEXAW
2000
IEEE
112views Database» more  DEXAW 2000»
14 years 1 months ago
A Framework for Electronic Negotiations Based on Adjusted-Winner Mediation
This paper presents the design of a procedural framework for an electronic market mediation service based on the adjusted-winner procedure for fair division. The main benefit of a...
Michael Ströbel
MIDDLEWARE
2004
Springer
14 years 2 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
ACSAC
2005
IEEE
14 years 2 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
IEEEARES
2007
IEEE
14 years 3 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...