Sciweavers

95 search results - page 10 / 19
» Trustworthy Access Control with Untrustworthy Web Servers
Sort
View
BIS
2007
120views Business» more  BIS 2007»
13 years 8 months ago
Security Issues for the Use of Semantic Web in E-Commerce
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology’s integrity and availability. In addition, both suppliers and...
Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar ...
ICCCN
1998
IEEE
13 years 11 months ago
HYDRANET : Network Support for Scaling of Large-Scale Services
With the explosive growth of demand for services on the Internet, the networking infrastructure (routers, protocols, servers) is under considerable stress. Mechanisms are needed f...
Hamesh Chawla, Geoff Dillon, Riccardo Bettati
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 2 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
CCS
2008
ACM
13 years 9 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
ACSAC
2000
IEEE
13 years 11 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer