Sciweavers

1403 search results - page 149 / 281
» Security Model for XML Data
Sort
View
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
WISE
2000
Springer
14 years 2 months ago
Modelling the Webspace of an Intranet
Searching the internet using the currently available searchengines is not satisfactory. Thetechniquesused there focus on the extraction of relevant informationdirectlyfrom the doc...
Roelof van Zwol, Peter M. G. Apers
SAC
2006
ACM
14 years 4 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
TITB
2010
128views Education» more  TITB 2010»
13 years 4 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
CCS
2009
ACM
14 years 4 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning