Sciweavers

332 search results - page 47 / 67
» Towards an Automatic Analysis of Web Service Security
Sort
View
WWW
2008
ACM
14 years 9 months ago
Plurality: a context-aware personalized tagging system
We present the design of Plurality,1 an interactive tagging system. Plurality's modular architecture allows users to automatically generate high-quality tags over Web content...
Robert Graham, Brian Eoff, James Caverlee
ELPUB
2008
ACM
13 years 10 months ago
The state of metadata in open access journals: possibilities and restrictions
This paper reports on an inquiry into the use of metadata, publishing formats, and markup in editormanaged open access journals. It builds on findings from a study of the document...
Helena Francke
ASIACRYPT
2009
Springer
14 years 3 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
ICDCS
2010
IEEE
13 years 6 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CCS
2011
ACM
12 years 8 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...