Sciweavers

1403 search results - page 155 / 281
» Security Model for XML Data
Sort
View
ISI
2008
Springer
13 years 10 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
ACSAC
2000
IEEE
14 years 2 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 10 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
IEEEARES
2008
IEEE
14 years 4 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
DPD
2002
120views more  DPD 2002»
13 years 10 months ago
An Overview of Standards and Related Technology in Web Services
The Internet is revolutionizing business by providing an affordable and efficient way to link companies with their partners as well as customers. Nevertheless, there are problems t...
Aphrodite Tsalgatidou, Thomi Pilioura