Sciweavers

373 search results - page 42 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
INTERACT
2003
13 years 9 months ago
Implementing Learning Content Management
: The concept of Learning Objects has been introduced in the e-learning field to enhance the accessibility, reusability, and interoperability of learning content. Despite intensive...
Samuel Schluep, Pamela Ravasio, Sissel Guttormsen ...
ENTCS
2007
112views more  ENTCS 2007»
13 years 7 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
COMPSAC
2009
IEEE
13 years 5 months ago
A Survey of Physiological Monitoring Data Models to Support the Service of Critical Care
Vast quantities of data is created by utilizing sensors to gather information from patients located in intensive care units worldwide through physiological monitoring. The service ...
Carolyn McGregor, Kathleen P. Smith
DBSEC
2011
233views Database» more  DBSEC 2011»
12 years 11 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson