Sciweavers

1863 search results - page 283 / 373
» Security Architecture for Web Services
Sort
View
ACMICEC
2006
ACM
89views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
A semantic web approach to handling soft constraints in virtual organisations
In this paper we present a proposal for representing soft constraint satisfaction problems (CSPs) within the Semantic Web architecture. The proposal is motivated by the need for a...
Alun D. Preece, Stuart Chalmers, Craig McKenzie, J...
CBMS
2007
IEEE
14 years 4 months ago
Enabling the European Patient Summary through Triplespaces
One of the main items on the eHealth agenda of the European Community is the design and promotion of electronic patient summaries as an instrument to facilitate the pervasive deli...
Reto Krummenacher, Elena Paslaru Bontas Simperl, L...
IPPS
2006
IEEE
14 years 4 months ago
The benefits of Java and Jini in the JGrid system
The Java language and platform have been considered by many as natural candidate for creating grid systems. The platform-independent runtime environment, safe and high-level langu...
Szabolcs Pota, Zoltan Juhasz
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 10 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
EUROPKI
2005
Springer
14 years 3 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...