Sciweavers

819 search results - page 150 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
IEEEARES
2010
IEEE
14 years 19 days ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
SAC
2006
ACM
13 years 7 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
IEEESCC
2007
IEEE
14 years 1 months ago
Development of NeuronBank: A Federation of Customizable Knowledge Bases of Neuronal Circuitry
Knowledge of neuronal circuitry is foundational to the neurosciences, but no tools have been developed for cataloguing this knowledge. Part of the problem is that the concepts use...
Robert J. Calin-Jageman, Akshaye Dhawan, Hong Yang...
AGTIVE
2007
Springer
14 years 1 months ago
Combining Quality Assurance and Model Transformations in Business-Driven Development
Abstract. Business-driven development is a methodology for developing IT solutions that directly satisfy business requirements. At its core are business processes, which are usuall...
Jana Koehler, Thomas Gschwind, Jochen Malte Kü...