Sciweavers

1863 search results - page 294 / 373
» Security Architecture for Web Services
Sort
View
ESORICS
2008
Springer
13 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
SIS
2008
13 years 11 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
JHSN
2006
267views more  JHSN 2006»
13 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
DEXAW
2005
IEEE
161views Database» more  DEXAW 2005»
14 years 3 months ago
Adding Semantics to Business Intelligence
  Despite  the  importance  of  analytical  tools  to  organisations,  they  still  lack  the  inference  power  needed to  solve the requests of decision mak...
Denilson Sell, Liliana Cabral, Enrico Motta, John ...
MDM
2004
Springer
111views Communications» more  MDM 2004»
14 years 3 months ago
Mobile Agents: Right Concept, Wrong Approach
This position paper looks back and takes stock in the context of mobile agent technologies1 . Our claim is that mobile agent technologies received wrong attention. Partially becau...
Dag Johansen