Sciweavers

1512 search results - page 276 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ACSAC
2005
IEEE
14 years 2 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 2 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
14 years 18 days ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
BIS
2008
174views Business» more  BIS 2008»
13 years 10 months ago
Hubbub - An Innovative Customer Support Forum
Internet user forums have been proven to be effective not just as a community meeting place but also as a supporting tool for various business products. Traditional forums are desi...
Duong Nguyen, Simon Thompson, Cefn Hoile