Sciweavers

1403 search results - page 210 / 281
» Security Model for XML Data
Sort
View
MTA
2010
101views more  MTA 2010»
13 years 7 months ago
Enquiring MPEG-7 based multimedia ontologies
Machine understandable metadata forms the main prerequisite for the intelligent services envisaged in a Web, which going beyond mere data exchange and provides for effective conten...
Stamatia Dasiopoulou, Vassilis Tzouvaras, Ioannis ...
EUROSYS
2008
ACM
14 years 5 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 3 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
MSWIM
2006
ACM
14 years 2 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
CSFW
1999
IEEE
14 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...